From 9c18db1e03e72d1dffb4dc3a631834fc5cf206f3 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 12 Apr 2024 18:04:07 +0000 Subject: [PATCH] Auto-Update: 2024-04-12T18:01:15.416624+00:00 --- CVE-2013/CVE-2013-44xx/CVE-2013-4407.json | 12 +- CVE-2022/CVE-2022-220xx/CVE-2022-22060.json | 14 +- CVE-2022/CVE-2022-220xx/CVE-2022-22075.json | 14 +- CVE-2022/CVE-2022-220xx/CVE-2022-22076.json | 168 ++-- CVE-2022/CVE-2022-256xx/CVE-2022-25655.json | 14 +- CVE-2022/CVE-2022-256xx/CVE-2022-25678.json | 14 +- CVE-2022/CVE-2022-256xx/CVE-2022-25694.json | 204 ++--- CVE-2022/CVE-2022-257xx/CVE-2022-25705.json | 102 +-- CVE-2022/CVE-2022-257xx/CVE-2022-25709.json | 14 +- CVE-2022/CVE-2022-257xx/CVE-2022-25713.json | 14 +- CVE-2022/CVE-2022-257xx/CVE-2022-25726.json | 14 +- CVE-2022/CVE-2022-257xx/CVE-2022-25728.json | 14 +- CVE-2022/CVE-2022-257xx/CVE-2022-25729.json | 14 +- CVE-2022/CVE-2022-257xx/CVE-2022-25730.json | 14 +- CVE-2022/CVE-2022-257xx/CVE-2022-25731.json | 14 +- CVE-2022/CVE-2022-257xx/CVE-2022-25732.json | 14 +- CVE-2022/CVE-2022-257xx/CVE-2022-25733.json | 14 +- CVE-2022/CVE-2022-257xx/CVE-2022-25734.json | 14 +- CVE-2022/CVE-2022-257xx/CVE-2022-25735.json | 14 +- CVE-2022/CVE-2022-257xx/CVE-2022-25737.json | 14 +- CVE-2022/CVE-2022-257xx/CVE-2022-25738.json | 14 +- CVE-2022/CVE-2022-257xx/CVE-2022-25739.json | 14 +- CVE-2022/CVE-2022-257xx/CVE-2022-25740.json | 14 +- CVE-2022/CVE-2022-257xx/CVE-2022-25745.json | 14 +- CVE-2022/CVE-2022-257xx/CVE-2022-25747.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33211.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33213.json | 132 ++-- CVE-2022/CVE-2022-332xx/CVE-2022-33216.json | 168 ++-- CVE-2022/CVE-2022-332xx/CVE-2022-33220.json | 150 ++-- CVE-2022/CVE-2022-332xx/CVE-2022-33221.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33222.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33223.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33224.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33225.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33226.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33227.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33228.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33229.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33230.json | 150 ++-- CVE-2022/CVE-2022-332xx/CVE-2022-33231.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33232.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33233.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33240.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33242.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33243.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33244.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33245.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33246.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33248.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33250.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33251.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33254.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33256.json | 222 +++--- CVE-2022/CVE-2022-332xx/CVE-2022-33257.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33258.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33259.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33260.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33263.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33264.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33267.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33269.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33270.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33271.json | 162 ++-- CVE-2022/CVE-2022-332xx/CVE-2022-33272.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33273.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33275.json | 168 ++-- CVE-2022/CVE-2022-332xx/CVE-2022-33277.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33278.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33279.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33280.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33281.json | 150 ++-- CVE-2022/CVE-2022-332xx/CVE-2022-33282.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33287.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33288.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33289.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33291.json | 150 ++-- CVE-2022/CVE-2022-332xx/CVE-2022-33292.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33294.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33295.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33296.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33297.json | 14 +- CVE-2022/CVE-2022-332xx/CVE-2022-33298.json | 14 +- CVE-2022/CVE-2022-333xx/CVE-2022-33301.json | 14 +- CVE-2022/CVE-2022-333xx/CVE-2022-33302.json | 14 +- CVE-2022/CVE-2022-333xx/CVE-2022-33303.json | 14 +- CVE-2022/CVE-2022-333xx/CVE-2022-33304.json | 14 +- CVE-2022/CVE-2022-333xx/CVE-2022-33305.json | 14 +- CVE-2022/CVE-2022-333xx/CVE-2022-33306.json | 14 +- CVE-2022/CVE-2022-333xx/CVE-2022-33307.json | 14 +- CVE-2022/CVE-2022-333xx/CVE-2022-33309.json | 14 +- CVE-2022/CVE-2022-341xx/CVE-2022-34144.json | 14 +- CVE-2022/CVE-2022-341xx/CVE-2022-34145.json | 14 +- CVE-2022/CVE-2022-341xx/CVE-2022-34146.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40502.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40503.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40504.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40505.json | 114 +-- CVE-2022/CVE-2022-405xx/CVE-2022-40507.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40508.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40510.json | 210 ++--- CVE-2022/CVE-2022-405xx/CVE-2022-40512.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40513.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40514.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40515.json | 222 +++--- CVE-2022/CVE-2022-405xx/CVE-2022-40521.json | 150 ++-- CVE-2022/CVE-2022-405xx/CVE-2022-40522.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40523.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40524.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40525.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40527.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40529.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40530.json | 430 ++++++----- CVE-2022/CVE-2022-405xx/CVE-2022-40531.json | 398 +++++----- CVE-2022/CVE-2022-405xx/CVE-2022-40532.json | 606 ++++++++------- CVE-2022/CVE-2022-405xx/CVE-2022-40533.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40534.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40535.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40536.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40537.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40538.json | 132 ++-- CVE-2022/CVE-2022-405xx/CVE-2022-40539.json | 14 +- CVE-2022/CVE-2022-405xx/CVE-2022-40540.json | 148 ++-- CVE-2023/CVE-2023-216xx/CVE-2023-21624.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21625.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21626.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21627.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21628.json | 414 +++++----- CVE-2023/CVE-2023-216xx/CVE-2023-21629.json | 418 +++++----- CVE-2023/CVE-2023-216xx/CVE-2023-21630.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21631.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21632.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21633.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21634.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21635.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21636.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21637.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21638.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21639.json | 26 +- CVE-2023/CVE-2023-216xx/CVE-2023-21640.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21641.json | 96 +-- CVE-2023/CVE-2023-216xx/CVE-2023-21642.json | 114 +-- CVE-2023/CVE-2023-216xx/CVE-2023-21643.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21644.json | 222 +++--- CVE-2023/CVE-2023-216xx/CVE-2023-21646.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21647.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21648.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21649.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21650.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21651.json | 216 +++--- CVE-2023/CVE-2023-216xx/CVE-2023-21652.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21653.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21654.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21655.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21656.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21657.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21658.json | 200 ++--- CVE-2023/CVE-2023-216xx/CVE-2023-21659.json | 418 +++++----- CVE-2023/CVE-2023-216xx/CVE-2023-21660.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21661.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21662.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21663.json | 162 ++-- CVE-2023/CVE-2023-216xx/CVE-2023-21664.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21665.json | 148 ++-- CVE-2023/CVE-2023-216xx/CVE-2023-21666.json | 12 +- CVE-2023/CVE-2023-216xx/CVE-2023-21667.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21669.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21670.json | 12 +- CVE-2023/CVE-2023-216xx/CVE-2023-21671.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21672.json | 14 +- CVE-2023/CVE-2023-216xx/CVE-2023-21673.json | 340 ++++---- CVE-2023/CVE-2023-223xx/CVE-2023-22382.json | 14 +- CVE-2023/CVE-2023-223xx/CVE-2023-22383.json | 14 +- CVE-2023/CVE-2023-223xx/CVE-2023-22384.json | 14 +- CVE-2023/CVE-2023-223xx/CVE-2023-22385.json | 222 +++--- CVE-2023/CVE-2023-223xx/CVE-2023-22386.json | 14 +- CVE-2023/CVE-2023-223xx/CVE-2023-22387.json | 222 +++--- CVE-2023/CVE-2023-223xx/CVE-2023-22388.json | 14 +- CVE-2023/CVE-2023-226xx/CVE-2023-22666.json | 14 +- CVE-2023/CVE-2023-226xx/CVE-2023-22667.json | 14 +- CVE-2023/CVE-2023-226xx/CVE-2023-22668.json | 14 +- CVE-2023/CVE-2023-248xx/CVE-2023-24843.json | 14 +- CVE-2023/CVE-2023-248xx/CVE-2023-24844.json | 14 +- CVE-2023/CVE-2023-248xx/CVE-2023-24847.json | 26 +- CVE-2023/CVE-2023-248xx/CVE-2023-24848.json | 418 +++++----- CVE-2023/CVE-2023-248xx/CVE-2023-24849.json | 214 ++--- CVE-2023/CVE-2023-248xx/CVE-2023-24850.json | 14 +- CVE-2023/CVE-2023-248xx/CVE-2023-24851.json | 418 +++++----- CVE-2023/CVE-2023-248xx/CVE-2023-24852.json | 14 +- CVE-2023/CVE-2023-248xx/CVE-2023-24853.json | 14 +- CVE-2023/CVE-2023-248xx/CVE-2023-24854.json | 14 +- CVE-2023/CVE-2023-248xx/CVE-2023-24855.json | 26 +- CVE-2023/CVE-2023-285xx/CVE-2023-28537.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28538.json | 150 ++-- CVE-2023/CVE-2023-285xx/CVE-2023-28539.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28540.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28541.json | 214 ++--- CVE-2023/CVE-2023-285xx/CVE-2023-28542.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28543.json | 78 +- CVE-2023/CVE-2023-285xx/CVE-2023-28544.json | 214 ++--- CVE-2023/CVE-2023-285xx/CVE-2023-28545.json | 202 ++--- CVE-2023/CVE-2023-285xx/CVE-2023-28546.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28548.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28549.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28550.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28551.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28553.json | 190 ++--- CVE-2023/CVE-2023-285xx/CVE-2023-28554.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28555.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28556.json | 414 +++++----- CVE-2023/CVE-2023-285xx/CVE-2023-28557.json | 396 +++++----- CVE-2023/CVE-2023-285xx/CVE-2023-28558.json | 410 +++++----- CVE-2023/CVE-2023-285xx/CVE-2023-28559.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28560.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28561.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28562.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28563.json | 410 +++++----- CVE-2023/CVE-2023-285xx/CVE-2023-28564.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28565.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28566.json | 266 ++++--- CVE-2023/CVE-2023-285xx/CVE-2023-28567.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28568.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28569.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28570.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28571.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28572.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28573.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28574.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28575.json | 222 +++--- CVE-2023/CVE-2023-285xx/CVE-2023-28576.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28577.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28579.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28580.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28581.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28583.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28584.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28585.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28586.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28587.json | 14 +- CVE-2023/CVE-2023-285xx/CVE-2023-28588.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33014.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33015.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33016.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33017.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33018.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33019.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33020.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33021.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33022.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33024.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33025.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33026.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33027.json | 672 ++++++++-------- CVE-2023/CVE-2023-330xx/CVE-2023-33028.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33029.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33030.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33031.json | 222 +++--- CVE-2023/CVE-2023-330xx/CVE-2023-33032.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33033.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33034.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33035.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33036.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33037.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33038.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33039.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33040.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33041.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33042.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33043.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33044.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33045.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33046.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33047.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33048.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33049.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33053.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33054.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33055.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33056.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33057.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33058.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33059.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33060.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33061.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33062.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33063.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33064.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33065.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33067.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33068.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33069.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33070.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33071.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33072.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33074.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33076.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33077.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33079.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33080.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33081.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33082.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33083.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33085.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33087.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33088.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33089.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33092.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33094.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33097.json | 14 +- CVE-2023/CVE-2023-330xx/CVE-2023-33098.json | 14 +- CVE-2023/CVE-2023-331xx/CVE-2023-33106.json | 168 ++-- CVE-2023/CVE-2023-331xx/CVE-2023-33107.json | 14 +- CVE-2023/CVE-2023-331xx/CVE-2023-33108.json | 14 +- CVE-2023/CVE-2023-331xx/CVE-2023-33109.json | 14 +- CVE-2023/CVE-2023-331xx/CVE-2023-33110.json | 204 ++--- CVE-2023/CVE-2023-331xx/CVE-2023-33112.json | 14 +- CVE-2023/CVE-2023-331xx/CVE-2023-33113.json | 14 +- CVE-2023/CVE-2023-331xx/CVE-2023-33114.json | 14 +- CVE-2023/CVE-2023-331xx/CVE-2023-33116.json | 14 +- CVE-2023/CVE-2023-331xx/CVE-2023-33117.json | 234 +++--- CVE-2023/CVE-2023-331xx/CVE-2023-33118.json | 14 +- CVE-2023/CVE-2023-331xx/CVE-2023-33120.json | 14 +- CVE-2023/CVE-2023-435xx/CVE-2023-43511.json | 174 +++-- CVE-2023/CVE-2023-435xx/CVE-2023-43512.json | 14 +- CVE-2023/CVE-2023-435xx/CVE-2023-43513.json | 14 +- CVE-2023/CVE-2023-435xx/CVE-2023-43514.json | 14 +- CVE-2023/CVE-2023-435xx/CVE-2023-43516.json | 14 +- CVE-2023/CVE-2023-435xx/CVE-2023-43517.json | 14 +- CVE-2023/CVE-2023-435xx/CVE-2023-43518.json | 150 ++-- CVE-2023/CVE-2023-435xx/CVE-2023-43519.json | 14 +- CVE-2023/CVE-2023-435xx/CVE-2023-43520.json | 14 +- CVE-2023/CVE-2023-435xx/CVE-2023-43522.json | 14 +- CVE-2023/CVE-2023-435xx/CVE-2023-43523.json | 14 +- CVE-2023/CVE-2023-435xx/CVE-2023-43532.json | 14 +- CVE-2023/CVE-2023-435xx/CVE-2023-43533.json | 14 +- CVE-2023/CVE-2023-435xx/CVE-2023-43534.json | 14 +- CVE-2023/CVE-2023-435xx/CVE-2023-43535.json | 14 +- CVE-2023/CVE-2023-435xx/CVE-2023-43536.json | 222 +++--- CVE-2024/CVE-2024-01xx/CVE-2024-0157.json | 55 ++ CVE-2024/CVE-2024-223xx/CVE-2024-22334.json | 59 ++ CVE-2024/CVE-2024-223xx/CVE-2024-22339.json | 59 ++ CVE-2024/CVE-2024-223xx/CVE-2024-22358.json | 59 ++ CVE-2024/CVE-2024-223xx/CVE-2024-22359.json | 59 ++ CVE-2024/CVE-2024-288xx/CVE-2024-28878.json | 55 ++ CVE-2024/CVE-2024-302xx/CVE-2024-30210.json | 55 ++ CVE-2024/CVE-2024-303xx/CVE-2024-30382.json | 59 ++ CVE-2024/CVE-2024-303xx/CVE-2024-30384.json | 59 ++ CVE-2024/CVE-2024-303xx/CVE-2024-30386.json | 59 ++ CVE-2024/CVE-2024-303xx/CVE-2024-30387.json | 59 ++ CVE-2024/CVE-2024-303xx/CVE-2024-30388.json | 59 ++ CVE-2024/CVE-2024-303xx/CVE-2024-30389.json | 59 ++ CVE-2024/CVE-2024-303xx/CVE-2024-30390.json | 59 ++ CVE-2024/CVE-2024-303xx/CVE-2024-30391.json | 59 ++ CVE-2024/CVE-2024-303xx/CVE-2024-30392.json | 59 ++ CVE-2024/CVE-2024-303xx/CVE-2024-30397.json | 59 ++ CVE-2024/CVE-2024-303xx/CVE-2024-30398.json | 59 ++ CVE-2024/CVE-2024-304xx/CVE-2024-30401.json | 59 ++ CVE-2024/CVE-2024-304xx/CVE-2024-30402.json | 59 ++ CVE-2024/CVE-2024-304xx/CVE-2024-30403.json | 59 ++ CVE-2024/CVE-2024-310xx/CVE-2024-31069.json | 55 ++ CVE-2024/CVE-2024-34xx/CVE-2024-3400.json | 10 +- CVE-2024/CVE-2024-36xx/CVE-2024-3691.json | 92 +++ CVE-2024/CVE-2024-36xx/CVE-2024-3695.json | 92 +++ CVE-2024/CVE-2024-36xx/CVE-2024-3696.json | 92 +++ CVE-2024/CVE-2024-36xx/CVE-2024-3697.json | 92 +++ CVE-2024/CVE-2024-36xx/CVE-2024-3698.json | 92 +++ README.md | 107 +-- _state.csv | 815 ++++++++++---------- 367 files changed, 12775 insertions(+), 7639 deletions(-) create mode 100644 CVE-2024/CVE-2024-01xx/CVE-2024-0157.json create mode 100644 CVE-2024/CVE-2024-223xx/CVE-2024-22334.json create mode 100644 CVE-2024/CVE-2024-223xx/CVE-2024-22339.json create mode 100644 CVE-2024/CVE-2024-223xx/CVE-2024-22358.json create mode 100644 CVE-2024/CVE-2024-223xx/CVE-2024-22359.json create mode 100644 CVE-2024/CVE-2024-288xx/CVE-2024-28878.json create mode 100644 CVE-2024/CVE-2024-302xx/CVE-2024-30210.json create mode 100644 CVE-2024/CVE-2024-303xx/CVE-2024-30382.json create mode 100644 CVE-2024/CVE-2024-303xx/CVE-2024-30384.json create mode 100644 CVE-2024/CVE-2024-303xx/CVE-2024-30386.json create mode 100644 CVE-2024/CVE-2024-303xx/CVE-2024-30387.json create mode 100644 CVE-2024/CVE-2024-303xx/CVE-2024-30388.json create mode 100644 CVE-2024/CVE-2024-303xx/CVE-2024-30389.json create mode 100644 CVE-2024/CVE-2024-303xx/CVE-2024-30390.json create mode 100644 CVE-2024/CVE-2024-303xx/CVE-2024-30391.json create mode 100644 CVE-2024/CVE-2024-303xx/CVE-2024-30392.json create mode 100644 CVE-2024/CVE-2024-303xx/CVE-2024-30397.json create mode 100644 CVE-2024/CVE-2024-303xx/CVE-2024-30398.json create mode 100644 CVE-2024/CVE-2024-304xx/CVE-2024-30401.json create mode 100644 CVE-2024/CVE-2024-304xx/CVE-2024-30402.json create mode 100644 CVE-2024/CVE-2024-304xx/CVE-2024-30403.json create mode 100644 CVE-2024/CVE-2024-310xx/CVE-2024-31069.json create mode 100644 CVE-2024/CVE-2024-36xx/CVE-2024-3691.json create mode 100644 CVE-2024/CVE-2024-36xx/CVE-2024-3695.json create mode 100644 CVE-2024/CVE-2024-36xx/CVE-2024-3696.json create mode 100644 CVE-2024/CVE-2024-36xx/CVE-2024-3697.json create mode 100644 CVE-2024/CVE-2024-36xx/CVE-2024-3698.json diff --git a/CVE-2013/CVE-2013-44xx/CVE-2013-4407.json b/CVE-2013/CVE-2013-44xx/CVE-2013-4407.json index 65f4f4c3463..cf5ae81503d 100644 --- a/CVE-2013/CVE-2013-44xx/CVE-2013-4407.json +++ b/CVE-2013/CVE-2013-44xx/CVE-2013-4407.json @@ -2,12 +2,12 @@ "id": "CVE-2013-4407", "sourceIdentifier": "secalert@redhat.com", "published": "2013-11-23T18:55:04.657", - "lastModified": "2024-04-01T00:15:48.783", + "lastModified": "2024-04-12T16:15:08.747", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "HTTP::Body::Multipart in the HTTP-Body 1.08, 1.17, and earlier module for Perl uses the part of the uploaded file's name after the first \".\" character as the suffix of a temporary file, which makes it easier for remote attackers to conduct attacks by leveraging subsequent behavior that may assume the suffix is well-formed." + "value": "HTTP::Body::Multipart in the HTTP-Body module for Perl (1.07 through 1.22, before 1.23) uses the part of the uploaded file's name after the first \".\" character as the suffix of a temporary file, which makes it easier for remote attackers to conduct attacks by leveraging subsequent behavior that may assume the suffix is well-formed." }, { "lang": "es", @@ -202,11 +202,11 @@ "source": "secalert@redhat.com" }, { - "url": "http://git.shadowcat.co.uk/gitweb/gitweb.cgi?p=catagits/HTTP-Body.git;a=commit;h=13ac5b23c083bc56e32dd706ca02fca292bd2161", + "url": "http://git.shadowcat.co.uk/gitweb/gitweb.cgi?p=catagits/HTTP-Body.git%3Ba=commit%3Bh=13ac5b23c083bc56e32dd706ca02fca292bd2161", "source": "secalert@redhat.com" }, { - "url": "http://git.shadowcat.co.uk/gitweb/gitweb.cgi?p=catagits/HTTP-Body.git;a=commit;h=cc75c886256f187cda388641931e8dafad6c2346", + "url": "http://git.shadowcat.co.uk/gitweb/gitweb.cgi?p=catagits/HTTP-Body.git%3Ba=commit%3Bh=cc75c886256f187cda388641931e8dafad6c2346", "source": "secalert@redhat.com" }, { @@ -220,6 +220,10 @@ { "url": "https://metacpan.org/release/GETTY/HTTP-Body-1.23/", "source": "secalert@redhat.com" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2024/04/07/1", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22060.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22060.json index 05eb34d6d5a..54c3b4234e0 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22060.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22060.json @@ -2,8 +2,8 @@ "id": "CVE-2022-22060", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:09.193", - "lastModified": "2023-06-13T19:05:32.743", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:53.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22075.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22075.json index 64ff5445f3a..6666866f0e4 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22075.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22075.json @@ -2,8 +2,8 @@ "id": "CVE-2022-22075", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:11.037", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:53.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22076.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22076.json index 8b76f9e0bbb..b6b2fe0e1c9 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22076.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22076.json @@ -2,8 +2,8 @@ "id": "CVE-2022-22076", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:09.717", - "lastModified": "2023-06-13T19:04:27.303", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:54.350", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-310" + } + ] } ], "configurations": [ @@ -75,9 +85,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" } ] }, @@ -86,9 +96,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" } ] } @@ -97,17 +107,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:9205_lte_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "920F873B-F52D-4754-9726-BECCAD0CAC45" - } - ] - }, { "operator": "OR", "negate": false, @@ -118,23 +117,23 @@ "matchCriteriaId": "5EB573E2-C2B9-4B12-9EEF-9152FBFE3927" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:9206_lte_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E2C2632A-02F2-4C59-AF96-E2C77940360F" + "criteria": "cpe:2.3:o:qualcomm:9205_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "920F873B-F52D-4754-9726-BECCAD0CAC45" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -145,23 +144,23 @@ "matchCriteriaId": "D10A104D-951A-4FA9-938A-1324640A998D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:9207_lte_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9CB54B6E-0AAE-428D-A264-4BF58A852645" + "criteria": "cpe:2.3:o:qualcomm:9206_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2C2632A-02F2-4C59-AF96-E2C77940360F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -172,23 +171,23 @@ "matchCriteriaId": "E12F5DF9-4D12-4321-A92C-86862A91E816" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6FEDA6CA-A0FD-4A72-B856-C8E65AC86902" + "criteria": "cpe:2.3:o:qualcomm:9207_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CB54B6E-0AAE-428D-A264-4BF58A852645" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -199,23 +198,23 @@ "matchCriteriaId": "8D29295A-7183-46BE-B4EE-F891D1C17ED9" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:apq8037_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DEE0D211-0EF0-441A-9E10-3DE578811250" + "criteria": "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEDA6CA-A0FD-4A72-B856-C8E65AC86902" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -226,23 +225,23 @@ "matchCriteriaId": "A594A57E-525C-451C-B3BA-567E0F757968" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CDCB8499-A096-4633-8506-63C0A227A958" + "criteria": "cpe:2.3:o:qualcomm:apq8037_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DEE0D211-0EF0-441A-9E10-3DE578811250" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -253,23 +252,23 @@ "matchCriteriaId": "BEE2C7C3-E928-4466-B537-0D1826E2223C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + "criteria": "cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDCB8499-A096-4633-8506-63C0A227A958" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -280,6 +279,17 @@ "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + } + ] } ] }, @@ -291,9 +301,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" } ] }, @@ -302,9 +312,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" } ] } diff --git a/CVE-2022/CVE-2022-256xx/CVE-2022-25655.json b/CVE-2022/CVE-2022-256xx/CVE-2022-25655.json index 04b4dd0ea74..aeb7cd446a3 100644 --- a/CVE-2022/CVE-2022-256xx/CVE-2022-25655.json +++ b/CVE-2022/CVE-2022-256xx/CVE-2022-25655.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25655", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:11.117", - "lastModified": "2023-03-15T17:05:17.123", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:54.893", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-256xx/CVE-2022-25678.json b/CVE-2022/CVE-2022-256xx/CVE-2022-25678.json index e970a70ff7c..c059c53c089 100644 --- a/CVE-2022/CVE-2022-256xx/CVE-2022-25678.json +++ b/CVE-2022/CVE-2022-256xx/CVE-2022-25678.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25678", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:07.617", - "lastModified": "2023-04-21T03:50:43.547", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:55.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-256xx/CVE-2022-25694.json b/CVE-2022/CVE-2022-256xx/CVE-2022-25694.json index bcb5b525eb0..f699c838762 100644 --- a/CVE-2022/CVE-2022-256xx/CVE-2022-25694.json +++ b/CVE-2022/CVE-2022-256xx/CVE-2022-25694.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25694", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:11.190", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:55.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-119" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ @@ -723,9 +733,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9310_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A56C8CC4-304F-494A-B794-F7ED242F7773" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF11BFFD-C16A-4999-9497-6D89B8F9A9D3" } ] }, @@ -734,9 +744,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:mdm9310:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AF11BFFD-C16A-4999-9497-6D89B8F9A9D3" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9310_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A56C8CC4-304F-494A-B794-F7ED242F7773" } ] } @@ -745,17 +755,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9330_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EC8F7F3C-D31B-400C-A4CB-DB30027E9B16" - } - ] - }, { "operator": "OR", "negate": false, @@ -766,23 +765,23 @@ "matchCriteriaId": "5F9133B8-5415-4840-BD0A-54ACF3F26988" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49" + "criteria": "cpe:2.3:o:qualcomm:mdm9330_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC8F7F3C-D31B-400C-A4CB-DB30027E9B16" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -793,23 +792,23 @@ "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "71E28EA6-0683-4755-8ABB-7F37DA810E4F" + "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -820,23 +819,23 @@ "matchCriteriaId": "D4DF4D4E-CDAA-42BB-802E-2722E7F3DBC2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9615m_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E73D98C-3D2D-41D9-BEC3-A5A2A07B279E" + "criteria": "cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71E28EA6-0683-4755-8ABB-7F37DA810E4F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -847,23 +846,23 @@ "matchCriteriaId": "EA5E4BD0-32E1-422E-A841-969FA8D5AC9F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "ADC6FBEE-D2FA-4660-A078-D6CE2097653D" + "criteria": "cpe:2.3:o:qualcomm:mdm9615m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E73D98C-3D2D-41D9-BEC3-A5A2A07B279E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -874,23 +873,23 @@ "matchCriteriaId": "F6BD8A1C-D9AB-4BE7-A855-31E58631879C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9630_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E3CC746B-25AC-4AF9-AC84-E6CA07523442" + "criteria": "cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADC6FBEE-D2FA-4660-A078-D6CE2097653D" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -901,23 +900,23 @@ "matchCriteriaId": "16BF7E2D-498E-4AF2-9897-757902914AC3" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B" + "criteria": "cpe:2.3:o:qualcomm:mdm9630_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3CC746B-25AC-4AF9-AC84-E6CA07523442" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -928,23 +927,23 @@ "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507" + "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -955,23 +954,23 @@ "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2C8807E9-5972-47E7-8B39-2E4D68C7B79E" + "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -982,6 +981,17 @@ "matchCriteriaId": "57963412-14B9-4C0D-AA0D-6928445DB808" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C8807E9-5972-47E7-8B39-2E4D68C7B79E" + } + ] } ] }, @@ -993,9 +1003,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:msm8208_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3DFC1839-E1D2-4832-A727-B78454F0C4A1" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8208:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDF54A14-FDCD-445F-9F51-4AAAA17C392D" } ] }, @@ -1004,9 +1014,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:msm8208:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BDF54A14-FDCD-445F-9F51-4AAAA17C392D" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8208_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3DFC1839-E1D2-4832-A727-B78454F0C4A1" } ] } diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25705.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25705.json index 200bab8bfd0..fa1f3761aea 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25705.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25705.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25705", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:11.257", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:55.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-190" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-680" + } + ] } ], "configurations": [ @@ -1155,9 +1165,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763" } ] }, @@ -1166,9 +1176,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", - "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984" } ] } @@ -1177,17 +1187,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DFB39496-8699-4DAF-BD7B-AE69260B20CB" - } - ] - }, { "operator": "OR", "negate": false, @@ -1198,23 +1197,23 @@ "matchCriteriaId": "E9CFBC24-5F15-40DE-806E-62C1EE808992" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6174_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D0814A50-D8E6-42BD-A0A3-0768A3E28F53" + "criteria": "cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFB39496-8699-4DAF-BD7B-AE69260B20CB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1225,6 +1224,17 @@ "matchCriteriaId": "D2AD8F5C-1FEB-45C2-BC8F-123C2BEB0EA5" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0814A50-D8E6-42BD-A0A3-0768A3E28F53" + } + ] } ] }, @@ -1236,9 +1246,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66" } ] }, @@ -1247,9 +1257,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" } ] } @@ -1641,9 +1651,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" } ] }, @@ -1652,9 +1662,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", - "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" } ] } @@ -1695,9 +1705,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "95CFB656-804A-453C-A39B-1B08C0A16BB9" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F0C9ED5-27E3-48EC-9A05-862715EE2034" } ] }, @@ -1706,9 +1716,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7F0C9ED5-27E3-48EC-9A05-862715EE2034" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95CFB656-804A-453C-A39B-1B08C0A16BB9" } ] } diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25709.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25709.json index 84e2718a00e..19e8c04e992 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25709.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25709.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25709", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:11.340", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:56.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-119" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25713.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25713.json index 0dd8856b664..d1414d52527 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25713.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25713.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25713", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:08.500", - "lastModified": "2023-05-09T16:38:01.897", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:56.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-119" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25726.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25726.json index 6bef11ff352..91fd9c8cd3b 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25726.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25726.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25726", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:10.993", - "lastModified": "2023-04-20T22:27:54.003", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:56.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25728.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25728.json index 4bcf553fbd5..f36766a68bc 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25728.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25728.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25728", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:12.777", - "lastModified": "2023-02-21T18:12:26.053", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:56.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25729.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25729.json index e3e41db4f03..f6f2e3b39ce 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25729.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25729.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25729", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:13.313", - "lastModified": "2023-02-21T18:12:35.670", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:57.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25730.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25730.json index 5f99429d069..e9c8beb184f 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25730.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25730.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25730", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:11.667", - "lastModified": "2023-04-24T16:56:39.827", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:57.350", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25731.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25731.json index 06d23118a29..d5732be539b 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25731.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25731.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25731", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:11.937", - "lastModified": "2023-04-21T03:50:34.460", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:57.473", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-131" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25732.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25732.json index c7b5b5262c7..dd3ec43a89b 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25732.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25732.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25732", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:13.387", - "lastModified": "2023-02-21T18:12:42.460", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:57.597", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25733.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25733.json index 61be2adb07f..837cec58b2f 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25733.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25733.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25733", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:13.460", - "lastModified": "2023-02-21T17:44:58.377", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:57.730", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-476" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25734.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25734.json index 18833b629ca..3fa8f9831b9 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25734.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25734.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25734", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:13.537", - "lastModified": "2023-02-21T17:45:33.717", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:57.897", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-835" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25735.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25735.json index 9c3905ff8b2..87b407addc2 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25735.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25735.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25735", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:13.610", - "lastModified": "2023-02-21T17:52:46.633", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:58.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-476" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25737.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25737.json index 260ba8e69b1..ad4d7adbbe6 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25737.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25737.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25737", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:12.383", - "lastModified": "2023-04-21T03:50:27.760", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:58.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-908" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-457" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25738.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25738.json index 079170bc932..fbf26f068bb 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25738.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25738.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25738", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:13.683", - "lastModified": "2023-02-21T18:00:21.640", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:58.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25739.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25739.json index 50caf28c8e3..66e354b8683 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25739.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25739.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25739", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:12.627", - "lastModified": "2023-04-24T16:49:48.737", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:58.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-476" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25740.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25740.json index 90105802273..18f1c1dbd45 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25740.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25740.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25740", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:12.997", - "lastModified": "2023-04-21T03:50:17.157", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:58.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25745.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25745.json index 81ed19ab9a9..7f11d35e583 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25745.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25745.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25745", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:13.253", - "lastModified": "2023-04-24T16:20:18.903", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:58.823", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-670" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-670" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25747.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25747.json index ac1b810e5f8..39715f0d240 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25747.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25747.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25747", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:13.523", - "lastModified": "2023-04-21T03:49:56.473", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:58.953", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33211.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33211.json index 71a3bf4f05a..92f6397f205 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33211.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33211.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33211", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:13.833", - "lastModified": "2023-04-21T03:49:45.543", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:59.117", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-131" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33213.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33213.json index eac95fc3a6a..d61f47dc0ae 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33213.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33213.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33213", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:11.487", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:15:59.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ @@ -804,9 +814,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9330_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EC8F7F3C-D31B-400C-A4CB-DB30027E9B16" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F9133B8-5415-4840-BD0A-54ACF3F26988" } ] }, @@ -815,9 +825,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:mdm9330:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5F9133B8-5415-4840-BD0A-54ACF3F26988" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9330_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC8F7F3C-D31B-400C-A4CB-DB30027E9B16" } ] } @@ -826,17 +836,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49" - } - ] - }, { "operator": "OR", "negate": false, @@ -847,23 +846,23 @@ "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "71E28EA6-0683-4755-8ABB-7F37DA810E4F" + "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -874,23 +873,23 @@ "matchCriteriaId": "D4DF4D4E-CDAA-42BB-802E-2722E7F3DBC2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9615m_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E73D98C-3D2D-41D9-BEC3-A5A2A07B279E" + "criteria": "cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71E28EA6-0683-4755-8ABB-7F37DA810E4F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -901,23 +900,23 @@ "matchCriteriaId": "EA5E4BD0-32E1-422E-A841-969FA8D5AC9F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "ADC6FBEE-D2FA-4660-A078-D6CE2097653D" + "criteria": "cpe:2.3:o:qualcomm:mdm9615m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E73D98C-3D2D-41D9-BEC3-A5A2A07B279E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -928,23 +927,23 @@ "matchCriteriaId": "F6BD8A1C-D9AB-4BE7-A855-31E58631879C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9630_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E3CC746B-25AC-4AF9-AC84-E6CA07523442" + "criteria": "cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADC6FBEE-D2FA-4660-A078-D6CE2097653D" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -955,6 +954,17 @@ "matchCriteriaId": "16BF7E2D-498E-4AF2-9897-757902914AC3" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9630_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3CC746B-25AC-4AF9-AC84-E6CA07523442" + } + ] } ] }, @@ -966,9 +976,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA" } ] }, @@ -977,9 +987,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", - "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B" } ] } diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33216.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33216.json index 045cf785b37..09b9740a316 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33216.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33216.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33216", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:13.760", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:00.283", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-20" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ @@ -75,9 +85,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" } ] }, @@ -86,9 +96,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" } ] } @@ -97,17 +107,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" - } - ] - }, { "operator": "OR", "negate": false, @@ -118,23 +117,23 @@ "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -145,23 +144,23 @@ "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -172,23 +171,23 @@ "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -199,23 +198,23 @@ "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -226,23 +225,23 @@ "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -253,23 +252,23 @@ "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -280,6 +279,17 @@ "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] } ] }, @@ -291,9 +301,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2" } ] }, @@ -302,9 +312,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C" } ] } diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33220.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33220.json index 5d30f9e9efa..2af70eb2e8a 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33220.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33220.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33220", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:11.847", - "lastModified": "2023-09-08T16:44:50.403", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:00.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ @@ -79,9 +89,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" } ] }, @@ -90,9 +100,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" } ] } @@ -101,17 +111,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" - } - ] - }, { "operator": "OR", "negate": false, @@ -122,23 +121,23 @@ "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "96FBD6DF-F174-4690-AA3D-1E8974E3627F" + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -149,23 +148,23 @@ "matchCriteriaId": "A3BF86E1-3FAC-4A42-8C01-5944C6C30AE5" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + "criteria": "cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96FBD6DF-F174-4690-AA3D-1E8974E3627F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -176,23 +175,23 @@ "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -203,23 +202,23 @@ "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -230,23 +229,23 @@ "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -257,6 +256,17 @@ "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + } + ] } ] }, @@ -268,9 +278,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3" } ] }, @@ -279,9 +289,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" } ] } diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33221.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33221.json index 22a777b6897..c80fcbfe754 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33221.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33221.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33221", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:13.833", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:01.213", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33222.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33222.json index c836f2bb73e..4e4fbacd541 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33222.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33222.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33222", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:14.177", - "lastModified": "2023-04-21T03:49:36.037", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:01.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33223.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33223.json index f0e94dabce6..5fce3f49043 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33223.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33223.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33223", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:14.470", - "lastModified": "2023-04-21T03:49:32.003", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:01.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-476" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33224.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33224.json index 8dcb1321c11..5bcf5de10ff 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33224.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33224.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33224", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:09.850", - "lastModified": "2023-06-13T19:01:31.440", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:02.103", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33225.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33225.json index c79ffa4c1e7..34a30c2aee0 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33225.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33225.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33225", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:13.907", - "lastModified": "2023-02-21T18:05:27.913", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:02.457", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33226.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33226.json index 83abf6065e2..5b183707a3d 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33226.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33226.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33226", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:10.000", - "lastModified": "2023-06-14T02:29:21.887", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:02.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33227.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33227.json index 6df608139d5..2383420f7c1 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33227.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33227.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33227", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:10.163", - "lastModified": "2023-06-13T16:54:21.383", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:03.067", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-415" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33228.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33228.json index ee1562399b1..5419349ac4c 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33228.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33228.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33228", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:14.767", - "lastModified": "2023-04-21T03:49:24.863", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:03.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33229.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33229.json index ec5a7e39eef..ec41f4bff22 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33229.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33229.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33229", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:13.980", - "lastModified": "2023-02-21T18:06:54.587", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:03.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33230.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33230.json index 833d8e61ce2..4d6edff5f74 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33230.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33230.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33230", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:10.320", - "lastModified": "2023-06-13T16:53:50.757", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:04.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ @@ -75,9 +85,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" } ] }, @@ -86,9 +96,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" } ] } @@ -97,17 +107,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "19013619-9B73-4A4F-B5B2-2A7D9A41D81E" - } - ] - }, { "operator": "OR", "negate": false, @@ -118,23 +117,23 @@ "matchCriteriaId": "9523ACC9-9D2F-4A40-9CEF-9A9676176867" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "34AB9074-97A3-43F0-B829-CDB4E3066AC4" + "criteria": "cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19013619-9B73-4A4F-B5B2-2A7D9A41D81E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -145,23 +144,23 @@ "matchCriteriaId": "362252ED-1DB3-4CF6-86DD-14919826D75E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" + "criteria": "cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34AB9074-97A3-43F0-B829-CDB4E3066AC4" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -172,23 +171,23 @@ "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -199,23 +198,23 @@ "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0B1397F3-8CCF-4BBA-9F0F-A12E4F045754" + "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -226,23 +225,23 @@ "matchCriteriaId": "F5888224-567D-4C84-BE6D-17B636BF506C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" + "criteria": "cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B1397F3-8CCF-4BBA-9F0F-A12E4F045754" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -253,6 +252,17 @@ "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" + } + ] } ] }, @@ -264,9 +274,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB" } ] }, @@ -275,9 +285,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", - "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" } ] } diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33231.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33231.json index 986b1c24137..cdaad382c2b 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33231.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33231.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33231", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:15.057", - "lastModified": "2023-04-24T16:21:14.963", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:04.853", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-415" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33232.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33232.json index 8881746b77b..46f1406988f 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33232.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33232.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33232", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:14.053", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:05.717", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33233.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33233.json index 55dd2502f1b..8e547d06167 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33233.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33233.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33233", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:14.123", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:06.730", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-16" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33240.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33240.json index 2f83e20506f..627e20d29d9 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33240.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33240.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33240", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:10.437", - "lastModified": "2023-06-13T16:52:40.600", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:07.560", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-704" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-704" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33242.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33242.json index 69d4ae7e6d4..3859e3b7cea 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33242.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33242.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33242", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:11.557", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:07.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-287" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33243.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33243.json index 06a95ea43b9..b88ddba5703 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33243.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33243.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33243", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:14.213", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:08.560", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33244.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33244.json index 07d4fe79069..84cfb11b5f3 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33244.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33244.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33244", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:11.620", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:09.260", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33245.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33245.json index ded20f0b3e7..539928e7f97 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33245.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33245.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33245", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:11.690", - "lastModified": "2023-03-15T18:59:19.243", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:09.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33246.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33246.json index 9f2c0fc7604..54f66899510 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33246.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33246.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33246", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:14.283", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:10.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-119" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33248.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33248.json index 36b614a30b4..83a44509026 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33248.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33248.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33248", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:14.353", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:10.593", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-190" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-680" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33250.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33250.json index f6bdac04d05..b70c022a309 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33250.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33250.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33250", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:11.757", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:11.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33251.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33251.json index f502101faed..160a79df888 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33251.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33251.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33251", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:10.560", - "lastModified": "2023-06-13T16:48:04.850", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:11.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33254.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33254.json index e5be009495d..289370b42ef 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33254.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33254.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33254", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:11.830", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:12.140", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33256.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33256.json index 0506efea1b8..46722ff1787 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33256.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33256.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33256", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:11.897", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:12.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-129" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ @@ -750,9 +760,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "40CAEB7F-1E1A-43CC-8663-171108DA27D0" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE196A0-AB55-4A5B-A1D6-630706310163" } ] }, @@ -761,9 +771,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CDE196A0-AB55-4A5B-A1D6-630706310163" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40CAEB7F-1E1A-43CC-8663-171108DA27D0" } ] } @@ -772,17 +782,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7E170AD8-2723-42AA-9350-344874C4AC8A" - } - ] - }, { "operator": "OR", "negate": false, @@ -793,23 +792,23 @@ "matchCriteriaId": "13D505D9-E00B-4934-AD85-E5EA2921FD50" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "13286F2B-0FD1-474A-A632-1AA19B110536" + "criteria": "cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E170AD8-2723-42AA-9350-344874C4AC8A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -820,23 +819,23 @@ "matchCriteriaId": "F6EA3F98-0F45-44D3-9305-4F548B437011" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2D52BC3A-6822-43B9-8CEA-2659481A9BA0" + "criteria": "cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13286F2B-0FD1-474A-A632-1AA19B110536" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -847,23 +846,23 @@ "matchCriteriaId": "CC954854-0407-402B-8013-FAF53F1F5DC7" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" + "criteria": "cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D52BC3A-6822-43B9-8CEA-2659481A9BA0" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -874,23 +873,23 @@ "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -901,23 +900,23 @@ "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "577B18AC-9892-4373-AC0F-9FD477D64388" + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -928,23 +927,23 @@ "matchCriteriaId": "EAF0EC2E-185F-40D4-AAE7-5F7ED76EC26F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF" + "criteria": "cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "577B18AC-9892-4373-AC0F-9FD477D64388" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -955,23 +954,23 @@ "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B991D515-9072-488F-B338-D7776C70FB62" + "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -982,23 +981,23 @@ "matchCriteriaId": "3F65BF0A-CC8F-4A4B-9FD4-7FC7066424F6" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" + "criteria": "cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B991D515-9072-488F-B338-D7776C70FB62" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1009,23 +1008,23 @@ "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B726BE34-E18B-4A88-B8E6-778215FD419E" + "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1036,6 +1035,17 @@ "matchCriteriaId": "585B794A-0674-418B-B45B-42EA97C40B9F" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B726BE34-E18B-4A88-B8E6-778215FD419E" + } + ] } ] }, @@ -1047,9 +1057,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "18431C93-7497-4A2C-9B5A-B9E4C7F88B7D" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0BF0FFBA-73EC-4615-98D2-BA62D67353DB" } ] }, @@ -1058,9 +1068,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0BF0FFBA-73EC-4615-98D2-BA62D67353DB" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18431C93-7497-4A2C-9B5A-B9E4C7F88B7D" } ] } diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33257.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33257.json index 6a5dc72b5f9..2d0e76185ce 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33257.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33257.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33257", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:11.963", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:13.023", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-367" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33258.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33258.json index 774ddc54b09..36428c30343 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33258.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33258.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33258", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:15.523", - "lastModified": "2023-04-19T20:00:23.570", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:13.643", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33259.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33259.json index 98a03f9ff74..77725da309d 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33259.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33259.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33259", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:15.760", - "lastModified": "2023-04-21T03:49:17.797", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:13.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33260.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33260.json index 7ec8b56e3a1..e051d8b1ed9 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33260.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33260.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33260", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:12.030", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:14.353", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33263.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33263.json index cddc592e328..698c36d2d67 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33263.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33263.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33263", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:10.653", - "lastModified": "2023-06-13T16:47:35.737", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:14.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33264.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33264.json index e04aacf48d5..44a633034f4 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33264.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33264.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33264", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:10.740", - "lastModified": "2023-06-21T15:59:18.387", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:15.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33267.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33267.json index 6b080279c17..84c7d3fe14c 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33267.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33267.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33267", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:10.817", - "lastModified": "2023-06-13T16:44:32.647", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:16.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33269.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33269.json index 603c659ade7..1b9ffd60ee3 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33269.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33269.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33269", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:16.087", - "lastModified": "2023-04-24T16:14:54.773", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:16.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-190" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33270.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33270.json index 1ce2c2f4ec8..88d78eb4f7d 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33270.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33270.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33270", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:16.387", - "lastModified": "2023-04-24T16:15:28.127", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:17.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-367" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33271.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33271.json index ed22ec171e1..73f55a9eaa8 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33271.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33271.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33271", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:14.420", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:17.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ @@ -75,9 +85,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DD17C0A3-A200-4659-968B-B2DA03CB683F" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1F31FFB-982A-4308-82F8-C2480DABDED8" } ] }, @@ -86,9 +96,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B1F31FFB-982A-4308-82F8-C2480DABDED8" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD17C0A3-A200-4659-968B-B2DA03CB683F" } ] } @@ -97,17 +107,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" - } - ] - }, { "operator": "OR", "negate": false, @@ -118,23 +117,23 @@ "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -145,23 +144,23 @@ "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -172,23 +171,23 @@ "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B032F871-3EC2-427D-A06F-681A58075925" + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -199,23 +198,23 @@ "matchCriteriaId": "73286FFB-C267-46B7-8FEF-C96534656AF9" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C" + "criteria": "cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B032F871-3EC2-427D-A06F-681A58075925" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -226,23 +225,23 @@ "matchCriteriaId": "1AA32CC0-DE30-4B15-8EC6-1FAF14C5C4E2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -253,6 +252,17 @@ "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + } + ] } ] }, @@ -264,9 +274,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15" } ] }, @@ -275,9 +285,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*", - "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" } ] } @@ -885,9 +895,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "78A6F4F3-0CE3-4A02-B615-63E76C93ADC4" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*", + "matchCriteriaId": "31D07608-80F7-44AA-BE91-1F97FC1CE313" } ] }, @@ -896,9 +906,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*", - "matchCriteriaId": "31D07608-80F7-44AA-BE91-1F97FC1CE313" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78A6F4F3-0CE3-4A02-B615-63E76C93ADC4" } ] } diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33272.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33272.json index 41ddd7e0c51..f002abcad4c 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33272.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33272.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33272", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:12.100", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:18.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33273.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33273.json index 40ae07e3dc8..77c4a2dc41b 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33273.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33273.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33273", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T08:15:08.763", - "lastModified": "2023-05-09T18:33:28.843", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:18.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33275.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33275.json index 46555e72a79..1c402c2e750 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33275.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33275.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33275", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:11.983", - "lastModified": "2023-09-08T16:44:20.943", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:19.573", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-129" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ @@ -79,9 +89,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" } ] }, @@ -90,9 +100,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" } ] } @@ -101,17 +111,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" - } - ] - }, { "operator": "OR", "negate": false, @@ -122,23 +121,23 @@ "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -149,23 +148,23 @@ "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B032F871-3EC2-427D-A06F-681A58075925" + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -176,23 +175,23 @@ "matchCriteriaId": "73286FFB-C267-46B7-8FEF-C96534656AF9" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C" + "criteria": "cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B032F871-3EC2-427D-A06F-681A58075925" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -203,23 +202,23 @@ "matchCriteriaId": "1AA32CC0-DE30-4B15-8EC6-1FAF14C5C4E2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -230,23 +229,23 @@ "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -257,23 +256,23 @@ "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3" + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -284,6 +283,17 @@ "matchCriteriaId": "770F3924-BE27-4BDE-B922-680B3C9753EB" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3" + } + ] } ] }, @@ -295,9 +305,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "19013619-9B73-4A4F-B5B2-2A7D9A41D81E" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9523ACC9-9D2F-4A40-9CEF-9A9676176867" } ] }, @@ -306,9 +316,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9523ACC9-9D2F-4A40-9CEF-9A9676176867" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19013619-9B73-4A4F-B5B2-2A7D9A41D81E" } ] } diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33277.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33277.json index 199cc63b4e1..984f82b2924 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33277.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33277.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33277", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:14.487", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:20.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33278.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33278.json index f3e6de81c67..d4c8b4e9b5c 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33278.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33278.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33278", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:12.167", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:21.577", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33279.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33279.json index c1ece0730e8..ed10c582273 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33279.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33279.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33279", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:14.557", - "lastModified": "2023-02-21T18:10:48.183", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:21.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33280.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33280.json index af0a014639c..77b2bdf41aa 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33280.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33280.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33280", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:14.630", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:22.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-824" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-824" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33281.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33281.json index 4a674bcdeff..2bc5ab30469 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33281.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33281.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33281", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:09.507", - "lastModified": "2023-05-09T16:37:34.280", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:22.397", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-129" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ @@ -75,9 +85,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn685x-5_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2A3CF46D-E1CB-447E-8371-15C3F49B1AA9" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn685x-5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B74FDAF1-82D0-4136-BF97-25C56FCEE77C" } ] }, @@ -86,9 +96,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn685x-5:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B74FDAF1-82D0-4136-BF97-25C56FCEE77C" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn685x-5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A3CF46D-E1CB-447E-8371-15C3F49B1AA9" } ] } @@ -97,17 +107,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn685x-1_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A07C2049-B227-4849-85D0-B53D690C7697" - } - ] - }, { "operator": "OR", "negate": false, @@ -118,23 +117,23 @@ "matchCriteriaId": "88D2DB07-B72B-4D44-A373-0C7EAB35F388" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn785x-1_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C41266FF-5555-4522-AD55-6A7CF8BA33D5" + "criteria": "cpe:2.3:o:qualcomm:wcn685x-1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A07C2049-B227-4849-85D0-B53D690C7697" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -145,23 +144,23 @@ "matchCriteriaId": "9E9C428C-7470-4178-9029-3234086D93F1" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn785x-5_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "04EA12D4-24E2-4FE9-8CD6-06A8E36DEB2F" + "criteria": "cpe:2.3:o:qualcomm:wcn785x-1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C41266FF-5555-4522-AD55-6A7CF8BA33D5" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -172,23 +171,23 @@ "matchCriteriaId": "2AED978B-0330-4B9B-B662-AA8E9E621996" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm8450_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A38C0AFD-D666-423C-8903-BB026965D97C" + "criteria": "cpe:2.3:o:qualcomm:wcn785x-5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04EA12D4-24E2-4FE9-8CD6-06A8E36DEB2F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -199,23 +198,23 @@ "matchCriteriaId": "59DBE92C-D428-4952-B94F-B46B3A627DFD" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + "criteria": "cpe:2.3:o:qualcomm:sm8450_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A38C0AFD-D666-423C-8903-BB026965D97C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -226,23 +225,23 @@ "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -253,6 +252,17 @@ "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] } ] }, @@ -264,9 +274,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" } ] }, @@ -275,9 +285,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" } ] } diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33282.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33282.json index df48d5c4295..948a02684b1 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33282.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33282.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33282", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:16.637", - "lastModified": "2023-04-24T16:11:15.057", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:22.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-190" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-680" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33287.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33287.json index 444083d61f2..6d187181014 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33287.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33287.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33287", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:16.907", - "lastModified": "2023-04-21T19:19:12.417", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:22.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33288.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33288.json index 1a0e81e44de..87df00a31a8 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33288.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33288.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33288", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:17.063", - "lastModified": "2023-04-21T19:19:45.383", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:23.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33289.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33289.json index b8dbdc46e85..4accf21915c 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33289.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33289.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33289", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:17.393", - "lastModified": "2023-04-21T19:11:55.220", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:23.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-129" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33291.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33291.json index 4dcd271616d..147552a6902 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33291.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33291.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33291", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:17.733", - "lastModified": "2023-04-24T14:11:38.507", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:24.350", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ @@ -75,9 +85,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:9205_lte_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "920F873B-F52D-4754-9726-BECCAD0CAC45" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:9205_lte_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5EB573E2-C2B9-4B12-9EEF-9152FBFE3927" } ] }, @@ -86,9 +96,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:9205_lte_modem:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5EB573E2-C2B9-4B12-9EEF-9152FBFE3927" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:9205_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "920F873B-F52D-4754-9726-BECCAD0CAC45" } ] } @@ -97,17 +107,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:9206_lte_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E2C2632A-02F2-4C59-AF96-E2C77940360F" - } - ] - }, { "operator": "OR", "negate": false, @@ -118,23 +117,23 @@ "matchCriteriaId": "D10A104D-951A-4FA9-938A-1324640A998D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:9207_lte_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9CB54B6E-0AAE-428D-A264-4BF58A852645" + "criteria": "cpe:2.3:o:qualcomm:9206_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2C2632A-02F2-4C59-AF96-E2C77940360F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -145,23 +144,23 @@ "matchCriteriaId": "E12F5DF9-4D12-4321-A92C-86862A91E816" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" + "criteria": "cpe:2.3:o:qualcomm:9207_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CB54B6E-0AAE-428D-A264-4BF58A852645" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -172,23 +171,23 @@ "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -199,23 +198,23 @@ "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -226,23 +225,23 @@ "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "34AB9074-97A3-43F0-B829-CDB4E3066AC4" + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -253,6 +252,17 @@ "matchCriteriaId": "362252ED-1DB3-4CF6-86DD-14919826D75E" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34AB9074-97A3-43F0-B829-CDB4E3066AC4" + } + ] } ] }, @@ -264,9 +274,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn685x-5_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2A3CF46D-E1CB-447E-8371-15C3F49B1AA9" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn685x-5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B74FDAF1-82D0-4136-BF97-25C56FCEE77C" } ] }, @@ -275,9 +285,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn685x-5:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B74FDAF1-82D0-4136-BF97-25C56FCEE77C" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn685x-5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A3CF46D-E1CB-447E-8371-15C3F49B1AA9" } ] } diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33292.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33292.json index 72f0900cf9e..e5580775f2e 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33292.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33292.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33292", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:09.757", - "lastModified": "2023-05-09T16:37:09.067", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:24.683", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33294.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33294.json index cabc0a26d0e..3a3291fb74e 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33294.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33294.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33294", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:18.090", - "lastModified": "2023-04-21T03:48:19.810", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:24.893", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-476" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33295.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33295.json index 00d8d35d5be..38f8034cb0c 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33295.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33295.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33295", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:18.300", - "lastModified": "2023-04-21T03:48:01.680", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:25.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33296.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33296.json index 30dc1cd24fd..50011bcbdec 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33296.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33296.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33296", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:18.563", - "lastModified": "2023-04-24T15:07:28.373", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:25.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-190" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-680" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33297.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33297.json index 42354272c58..4b8d27f18db 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33297.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33297.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33297", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:18.913", - "lastModified": "2023-04-24T16:11:31.613", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:25.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33298.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33298.json index f393cb3bf36..8705ae2a646 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33298.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33298.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33298", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:19.153", - "lastModified": "2023-04-24T16:38:04.317", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:25.903", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-333xx/CVE-2022-33301.json b/CVE-2022/CVE-2022-333xx/CVE-2022-33301.json index f90c2d49b0a..c26e453d4c6 100644 --- a/CVE-2022/CVE-2022-333xx/CVE-2022-33301.json +++ b/CVE-2022/CVE-2022-333xx/CVE-2022-33301.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33301", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:19.457", - "lastModified": "2023-04-24T16:48:09.743", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:26.120", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-704" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-704" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-333xx/CVE-2022-33302.json b/CVE-2022/CVE-2022-333xx/CVE-2022-33302.json index 5b04a7b5141..c0262a90ae8 100644 --- a/CVE-2022/CVE-2022-333xx/CVE-2022-33302.json +++ b/CVE-2022/CVE-2022-333xx/CVE-2022-33302.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33302", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:19.670", - "lastModified": "2023-04-24T16:34:08.083", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:26.307", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-129" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-333xx/CVE-2022-33303.json b/CVE-2022/CVE-2022-333xx/CVE-2022-33303.json index 270bddff87d..2b0e8e6cb1e 100644 --- a/CVE-2022/CVE-2022-333xx/CVE-2022-33303.json +++ b/CVE-2022/CVE-2022-333xx/CVE-2022-33303.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33303", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:10.903", - "lastModified": "2023-06-13T16:43:54.770", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:26.733", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-400" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-333xx/CVE-2022-33304.json b/CVE-2022/CVE-2022-333xx/CVE-2022-33304.json index 84e4e52a7dc..4994579869c 100644 --- a/CVE-2022/CVE-2022-333xx/CVE-2022-33304.json +++ b/CVE-2022/CVE-2022-333xx/CVE-2022-33304.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33304", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:09.910", - "lastModified": "2023-05-09T16:36:32.340", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:26.973", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-476" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-333xx/CVE-2022-33305.json b/CVE-2022/CVE-2022-333xx/CVE-2022-33305.json index 43f31e27528..e98537ac552 100644 --- a/CVE-2022/CVE-2022-333xx/CVE-2022-33305.json +++ b/CVE-2022/CVE-2022-333xx/CVE-2022-33305.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33305", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:09.997", - "lastModified": "2023-05-09T16:36:20.023", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:27.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-476" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-333xx/CVE-2022-33306.json b/CVE-2022/CVE-2022-333xx/CVE-2022-33306.json index 4dccf16f0e0..614d5d38d32 100644 --- a/CVE-2022/CVE-2022-333xx/CVE-2022-33306.json +++ b/CVE-2022/CVE-2022-333xx/CVE-2022-33306.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33306", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:14.700", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:27.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-333xx/CVE-2022-33307.json b/CVE-2022/CVE-2022-333xx/CVE-2022-33307.json index 9792bcbbc75..87bcbab0ff7 100644 --- a/CVE-2022/CVE-2022-333xx/CVE-2022-33307.json +++ b/CVE-2022/CVE-2022-333xx/CVE-2022-33307.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33307", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:10.993", - "lastModified": "2023-06-13T16:42:24.980", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:27.877", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-415" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-333xx/CVE-2022-33309.json b/CVE-2022/CVE-2022-333xx/CVE-2022-33309.json index be0a1a89ec7..70f1fd57b60 100644 --- a/CVE-2022/CVE-2022-333xx/CVE-2022-33309.json +++ b/CVE-2022/CVE-2022-333xx/CVE-2022-33309.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33309", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:12.233", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:28.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34144.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34144.json index e5db41373cd..f294c540992 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34144.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34144.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34144", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:10.077", - "lastModified": "2023-05-09T16:36:24.253", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:28.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34145.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34145.json index f7461315a38..6078ad9c4c5 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34145.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34145.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34145", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:14.767", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:28.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34146.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34146.json index c4c80740c1a..5d1061a3ffd 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34146.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34146.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34146", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:14.837", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:29.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-20" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40502.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40502.json index e1cff6a3bee..d8fd0c65af2 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40502.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40502.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40502", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:15.363", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:29.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-20" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40503.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40503.json index 61d476ff41f..1b6616e21e5 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40503.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40503.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40503", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:19.963", - "lastModified": "2023-04-24T15:50:06.663", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:29.560", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40504.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40504.json index 0b431dd0689..e8bb1fbc8c4 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40504.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40504.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40504", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T08:15:09.437", - "lastModified": "2023-05-12T18:23:13.213", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:29.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40505.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40505.json index 62c10fa8ec0..531a3657a1f 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40505.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40505.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40505", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:10.173", - "lastModified": "2023-05-09T16:34:33.830", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:30.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ @@ -75,9 +85,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:9205_lte_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "920F873B-F52D-4754-9726-BECCAD0CAC45" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:9205_lte_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5EB573E2-C2B9-4B12-9EEF-9152FBFE3927" } ] }, @@ -86,9 +96,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:9205_lte_modem:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5EB573E2-C2B9-4B12-9EEF-9152FBFE3927" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:9205_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "920F873B-F52D-4754-9726-BECCAD0CAC45" } ] } @@ -97,17 +107,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:9206_lte_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E2C2632A-02F2-4C59-AF96-E2C77940360F" - } - ] - }, { "operator": "OR", "negate": false, @@ -118,23 +117,23 @@ "matchCriteriaId": "D10A104D-951A-4FA9-938A-1324640A998D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:9207_lte_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9CB54B6E-0AAE-428D-A264-4BF58A852645" + "criteria": "cpe:2.3:o:qualcomm:9206_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2C2632A-02F2-4C59-AF96-E2C77940360F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -145,23 +144,23 @@ "matchCriteriaId": "E12F5DF9-4D12-4321-A92C-86862A91E816" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm8207_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FE3BA789-3EC2-474D-BD5F-AD67BAE64413" + "criteria": "cpe:2.3:o:qualcomm:9207_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CB54B6E-0AAE-428D-A264-4BF58A852645" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -172,23 +171,23 @@ "matchCriteriaId": "5954E2E1-3A62-4601-8D7F-21B7B2D02370" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DFB39496-8699-4DAF-BD7B-AE69260B20CB" + "criteria": "cpe:2.3:o:qualcomm:mdm8207_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE3BA789-3EC2-474D-BD5F-AD67BAE64413" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -199,6 +198,17 @@ "matchCriteriaId": "E9CFBC24-5F15-40DE-806E-62C1EE808992" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFB39496-8699-4DAF-BD7B-AE69260B20CB" + } + ] } ] }, @@ -210,9 +220,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca4010_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "04F1CE4C-CAF8-4AB9-B44D-ADC2F2E7CF4C" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca4010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "30C10881-C26D-452D-A2D1-8617C2709D60" } ] }, @@ -221,9 +231,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca4010:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30C10881-C26D-452D-A2D1-8617C2709D60" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca4010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F1CE4C-CAF8-4AB9-B44D-ADC2F2E7CF4C" } ] } diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40507.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40507.json index 559d8b55730..a974c6ab6ef 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40507.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40507.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40507", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:11.097", - "lastModified": "2023-06-21T15:59:21.797", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:30.573", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-415" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40508.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40508.json index d2773ec71cc..60503620d5d 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40508.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40508.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40508", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:10.263", - "lastModified": "2023-05-09T16:36:28.163", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:31.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40510.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40510.json index cace5079d56..4457395a120 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40510.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40510.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40510", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:12.757", - "lastModified": "2023-08-10T17:26:55.177", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:31.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-457" + } + ] } ], "configurations": [ @@ -1078,9 +1088,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "886CF046-E1D9-4FD4-AC02-EAB61C3F70FD" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "059486E9-3F99-4C65-A763-470564EDAF2C" } ] }, @@ -1089,9 +1099,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*", - "matchCriteriaId": "059486E9-3F99-4C65-A763-470564EDAF2C" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886CF046-E1D9-4FD4-AC02-EAB61C3F70FD" } ] } @@ -1105,9 +1115,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "966CDA56-809F-4FF4-909D-0DD92F44CF67" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C90747B4-2CC0-4816-A994-58E00F5ADA05" } ] }, @@ -1116,9 +1126,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C90747B4-2CC0-4816-A994-58E00F5ADA05" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "966CDA56-809F-4FF4-909D-0DD92F44CF67" } ] } @@ -4372,9 +4382,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E3FB2972-94B6-4716-BA96-4B452BA3990F" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57F4F872-094E-4E27-BB89-D8251FAFB713" } ] }, @@ -4383,9 +4393,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "57F4F872-094E-4E27-BB89-D8251FAFB713" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3FB2972-94B6-4716-BA96-4B452BA3990F" } ] } @@ -4394,17 +4404,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" - } - ] - }, { "operator": "OR", "negate": false, @@ -4415,23 +4414,23 @@ "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344" + "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4442,23 +4441,23 @@ "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4469,23 +4468,23 @@ "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4496,23 +4495,23 @@ "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sxr2150p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0DC13938-3BFD-4E10-ADB1-29E034D8A522" + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4523,23 +4522,23 @@ "matchCriteriaId": "F58E5590-0AE1-45DB-9F19-F7E28B3EF74D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FC012AD0-BCEE-4B1E-9B15-5D77D78CEA01" + "criteria": "cpe:2.3:o:qualcomm:sxr2150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DC13938-3BFD-4E10-ADB1-29E034D8A522" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4550,23 +4549,23 @@ "matchCriteriaId": "F51C69B9-F0AB-4BF5-A8C2-64FEB7075593" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" + "criteria": "cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC012AD0-BCEE-4B1E-9B15-5D77D78CEA01" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4577,23 +4576,23 @@ "matchCriteriaId": "5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "43A90019-4E96-40B5-9E4D-CCBDD51ACA34" + "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4604,6 +4603,17 @@ "matchCriteriaId": "BC3D23FE-B3D5-4EC3-8268-98F12181966D" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43A90019-4E96-40B5-9E4D-CCBDD51ACA34" + } + ] } ] }, @@ -4615,9 +4625,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539" } ] }, @@ -4626,9 +4636,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6" } ] } diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40512.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40512.json index cc219c9b7b9..715367231e4 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40512.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40512.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40512", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:15.430", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:31.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40513.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40513.json index b0228f3ef54..16720bfdb82 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40513.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40513.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40513", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:15.497", - "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:32.653", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-400" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40514.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40514.json index 8f14ea1a33f..b5d724728ec 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40514.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40514.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40514", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-02-12T04:15:15.567", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:32.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40515.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40515.json index 443ab4c4682..968088c2dbc 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40515.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40515.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40515", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:12.380", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:33.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-415" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] } ], "configurations": [ @@ -966,9 +976,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0" } ] }, @@ -977,9 +987,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", - "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" } ] } @@ -988,17 +998,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" - } - ] - }, { "operator": "OR", "negate": false, @@ -1009,23 +1008,23 @@ "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1036,23 +1035,23 @@ "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1063,23 +1062,23 @@ "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "00FE294D-4BE0-4436-9273-507E760884EC" + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1090,23 +1089,23 @@ "matchCriteriaId": "424CB795-58E5-43A4-A2EC-C563D93C5E72" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9" + "criteria": "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00FE294D-4BE0-4436-9273-507E760884EC" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1117,23 +1116,23 @@ "matchCriteriaId": "93ED74CE-6BF2-4983-8780-07D5336745B3" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" + "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1144,23 +1143,23 @@ "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1171,23 +1170,23 @@ "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1198,23 +1197,23 @@ "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1225,23 +1224,23 @@ "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1252,6 +1251,17 @@ "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] } ] }, @@ -1263,9 +1273,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" } ] }, @@ -1274,9 +1284,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" } ] } diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40521.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40521.json index b2507570c13..153b6603b66 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40521.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40521.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40521", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:11.180", - "lastModified": "2023-06-21T15:58:57.410", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:34.013", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-287" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] } ], "configurations": [ @@ -6258,9 +6268,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0F66A898-3C7A-4D44-86BD-89129F04E654" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B612B044-C7D1-4662-AB2A-5400E34A3CA7" } ] }, @@ -6269,9 +6279,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B612B044-C7D1-4662-AB2A-5400E34A3CA7" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F66A898-3C7A-4D44-86BD-89129F04E654" } ] } @@ -6280,17 +6290,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" - } - ] - }, { "operator": "OR", "negate": false, @@ -6301,23 +6300,23 @@ "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" + "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6328,23 +6327,23 @@ "matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6355,23 +6354,23 @@ "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6382,23 +6381,23 @@ "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6409,23 +6408,23 @@ "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6436,6 +6435,17 @@ "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + } + ] } ] }, @@ -6447,9 +6457,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" } ] }, @@ -6458,9 +6468,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" } ] } diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40522.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40522.json index 31f651420a0..2a873bb69fd 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40522.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40522.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40522", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:11.270", - "lastModified": "2023-06-10T02:07:08.483", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:34.617", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-415" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40523.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40523.json index d25694d9093..4965f59372a 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40523.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40523.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40523", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:11.357", - "lastModified": "2023-06-10T02:07:15.550", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:34.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-668" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40524.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40524.json index fbe7b16a01b..0b13881fd57 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40524.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40524.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40524", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.073", - "lastModified": "2023-09-08T16:43:52.900", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:35.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40525.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40525.json index eeb084a0edf..f3dbad89aa6 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40525.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40525.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40525", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:11.447", - "lastModified": "2023-06-10T02:07:22.437", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:35.617", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-668" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40527.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40527.json index ffb5d62643c..dfdd443feed 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40527.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40527.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40527", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:12.453", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:35.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40529.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40529.json index e5e3e699662..69c1ab839b3 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40529.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40529.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40529", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:11.520", - "lastModified": "2023-06-10T02:07:40.433", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:36.167", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-863" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40530.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40530.json index 3ce4ef52b79..fcadacce9a4 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40530.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40530.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40530", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:12.523", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:36.617", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-190" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-680" + } + ] } ], "configurations": [ @@ -1398,9 +1408,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" } ] }, @@ -1409,9 +1419,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", - "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" } ] } @@ -1420,17 +1430,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" - } - ] - }, { "operator": "OR", "negate": false, @@ -1441,23 +1440,23 @@ "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1468,23 +1467,23 @@ "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530" + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1495,23 +1494,23 @@ "matchCriteriaId": "C9EB615F-FD4C-450B-AB25-E936FD9816C4" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1522,23 +1521,23 @@ "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1549,23 +1548,23 @@ "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca8072_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1F4012FC-F0D9-41DE-BC2A-FBDD1B212540" + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1576,23 +1575,23 @@ "matchCriteriaId": "B16C4C53-F8BA-48D2-A7EE-90A06499722D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CC8A5A87-7D62-4EB7-962A-0F160DE3E889" + "criteria": "cpe:2.3:o:qualcomm:qca8072_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F4012FC-F0D9-41DE-BC2A-FBDD1B212540" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1603,23 +1602,23 @@ "matchCriteriaId": "7B68D126-7F49-4FFA-8AF8-78120973D78E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + "criteria": "cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC8A5A87-7D62-4EB7-962A-0F160DE3E889" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1630,23 +1629,23 @@ "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EB1F2E8B-1ED2-473D-AFD8-F2590F6BD414" + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1657,23 +1656,23 @@ "matchCriteriaId": "FBDA9657-7D30-41FD-8112-F53E6C69D53A" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1B9045A8-BA53-43C4-B24D-5EF320DE7A4A" + "criteria": "cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB1F2E8B-1ED2-473D-AFD8-F2590F6BD414" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1684,6 +1683,17 @@ "matchCriteriaId": "3D6E8939-AFA3-41AC-B811-BCC282A43106" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B9045A8-BA53-43C4-B24D-5EF320DE7A4A" + } + ] } ] }, @@ -1695,9 +1705,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B87335A8-DC52-478E-B19F-0C4CC63132EA" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99C34523-FE2A-4DDC-9A8A-D9072F3D0FD3" } ] }, @@ -1706,9 +1716,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*", - "matchCriteriaId": "99C34523-FE2A-4DDC-9A8A-D9072F3D0FD3" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B87335A8-DC52-478E-B19F-0C4CC63132EA" } ] } @@ -4746,9 +4756,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "19013619-9B73-4A4F-B5B2-2A7D9A41D81E" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9523ACC9-9D2F-4A40-9CEF-9A9676176867" } ] }, @@ -4757,9 +4767,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9523ACC9-9D2F-4A40-9CEF-9A9676176867" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19013619-9B73-4A4F-B5B2-2A7D9A41D81E" } ] } @@ -4768,17 +4778,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "34AB9074-97A3-43F0-B829-CDB4E3066AC4" - } - ] - }, { "operator": "OR", "negate": false, @@ -4789,23 +4788,23 @@ "matchCriteriaId": "362252ED-1DB3-4CF6-86DD-14919826D75E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DF49BC31-A332-4B9A-A826-F63116D7029F" + "criteria": "cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34AB9074-97A3-43F0-B829-CDB4E3066AC4" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4816,23 +4815,23 @@ "matchCriteriaId": "6DD3C245-D5F8-4145-8CDF-F635D2C8F088" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + "criteria": "cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF49BC31-A332-4B9A-A826-F63116D7029F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4843,23 +4842,23 @@ "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F8EE21BA-7178-4D69-852D-2322844FC6B9" + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4870,23 +4869,23 @@ "matchCriteriaId": "E9BACB28-F6EA-445A-B74F-0C3881FE59CB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3293739B-53D5-48C1-BC3A-FAA74D6C7954" + "criteria": "cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8EE21BA-7178-4D69-852D-2322844FC6B9" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4897,23 +4896,23 @@ "matchCriteriaId": "E650C510-037F-47DB-A486-EBF871C73278" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DD031A8D-A48A-4363-8C00-C1FF5458D0FB" + "criteria": "cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3293739B-53D5-48C1-BC3A-FAA74D6C7954" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4924,23 +4923,23 @@ "matchCriteriaId": "64F5D7CA-6F31-4842-AC66-EB975C19C83D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "180EB150-C114-429D-941F-9B99CDA4F810" + "criteria": "cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD031A8D-A48A-4363-8C00-C1FF5458D0FB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4951,23 +4950,23 @@ "matchCriteriaId": "93BA62AF-3555-463A-8B51-76F07BF0B87E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "54C616C5-6480-4FE0-9A1C-08026CCB08D8" + "criteria": "cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "180EB150-C114-429D-941F-9B99CDA4F810" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4978,23 +4977,23 @@ "matchCriteriaId": "7D8E02BA-3A7E-4B13-A8D7-20FD0FAE3187" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "16EB11D8-27A3-4D04-B863-7FD4549D0BCD" + "criteria": "cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54C616C5-6480-4FE0-9A1C-08026CCB08D8" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5005,23 +5004,23 @@ "matchCriteriaId": "CF9B5B84-3C57-4D3D-AFF0-958A19DE09E8" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2FFC44DC-DA90-45F5-ACC1-5262D3E3A796" + "criteria": "cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16EB11D8-27A3-4D04-B863-7FD4549D0BCD" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5032,6 +5031,17 @@ "matchCriteriaId": "EE9D9A56-2157-43F0-BB18-2B7249D7E021" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FFC44DC-DA90-45F5-ACC1-5262D3E3A796" + } + ] } ] }, @@ -5043,9 +5053,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" } ] }, @@ -5054,9 +5064,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" } ] } diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40531.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40531.json index 4f54820dc85..411a942a29b 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40531.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40531.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40531", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:12.597", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:37.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-704" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-704" + } + ] } ], "configurations": [ @@ -3882,9 +3892,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9003_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6128C715-8085-47A8-9EE3-F8C67FC1236B" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9003:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73B9F6F0-2F3A-4A4E-91A1-39EE598E22A5" } ] }, @@ -3893,9 +3903,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcn9003:-:*:*:*:*:*:*:*", - "matchCriteriaId": "73B9F6F0-2F3A-4A4E-91A1-39EE598E22A5" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9003_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6128C715-8085-47A8-9EE3-F8C67FC1236B" } ] } @@ -3904,17 +3914,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13" - } - ] - }, { "operator": "OR", "negate": false, @@ -3925,23 +3924,23 @@ "matchCriteriaId": "02BA009F-24E1-4953-BA95-2A5BC1CDBDBB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3952,23 +3951,23 @@ "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "36A10EB2-E7A2-461F-836E-FC38B9428C98" + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3979,23 +3978,23 @@ "matchCriteriaId": "A457C1D6-A026-4B5F-9CB1-FA795785A515" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + "criteria": "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36A10EB2-E7A2-461F-836E-FC38B9428C98" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4006,6 +4005,17 @@ "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] } ] }, @@ -4017,9 +4027,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2C10CAAC-FD93-4116-9F0C-E983B3693FAF" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FEC2402-BA39-49BB-A34C-FF32ED44A158" } ] }, @@ -4028,9 +4038,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9FEC2402-BA39-49BB-A34C-FF32ED44A158" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C10CAAC-FD93-4116-9F0C-E983B3693FAF" } ] } @@ -4206,9 +4216,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD" } ] }, @@ -4217,9 +4227,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", - "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" } ] } @@ -4228,17 +4238,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153" - } - ] - }, { "operator": "OR", "negate": false, @@ -4249,23 +4248,23 @@ "matchCriteriaId": "FFCB9F22-57F2-4327-95B9-B2342A02E45E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2EEFADBF-D751-499B-80E5-C1069E129F18" + "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4276,23 +4275,23 @@ "matchCriteriaId": "D327FBA1-69B5-467B-9B1B-A0380994D21B" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B05FD66D-13A6-40E9-A64B-E428378F237E" + "criteria": "cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2EEFADBF-D751-499B-80E5-C1069E129F18" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4303,23 +4302,23 @@ "matchCriteriaId": "D0D665C1-3EBA-42F2-BF56-55E6C365F7DF" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + "criteria": "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B05FD66D-13A6-40E9-A64B-E428378F237E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4330,23 +4329,23 @@ "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169" + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4357,23 +4356,23 @@ "matchCriteriaId": "6DA2C3E1-E285-4CAD-9FA3-813C8EC436F6" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4384,23 +4383,23 @@ "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcx315_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D439DCCE-57AB-4C87-9C91-517A81341825" + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4411,23 +4410,23 @@ "matchCriteriaId": "EA6C1487-0206-46BF-BF5D-21752F4262EA" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "89A1AAD0-9336-4657-8E1E-74E8F490C06E" + "criteria": "cpe:2.3:o:qualcomm:qcx315_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D439DCCE-57AB-4C87-9C91-517A81341825" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4438,6 +4437,17 @@ "matchCriteriaId": "386F2F37-974B-40F2-9B23-ABD49C60E32D" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89A1AAD0-9336-4657-8E1E-74E8F490C06E" + } + ] } ] }, @@ -4449,9 +4459,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25" } ] }, @@ -4460,9 +4470,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" } ] } @@ -4935,9 +4945,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C819454D-D413-478A-B78D-CFF6994803A1" } ] }, @@ -4946,9 +4956,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C819454D-D413-478A-B78D-CFF6994803A1" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95" } ] } @@ -4962,9 +4972,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd_455_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B3EF9964-D615-473E-A289-8A01D91D87AA" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_455:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C177163-B6E6-42D8-8969-C2F9832C6701" } ] }, @@ -4973,9 +4983,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sd_455:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9C177163-B6E6-42D8-8969-C2F9832C6701" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_455_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3EF9964-D615-473E-A289-8A01D91D87AA" } ] } @@ -5988,9 +5998,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B991D515-9072-488F-B338-D7776C70FB62" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F65BF0A-CC8F-4A4B-9FD4-7FC7066424F6" } ] }, @@ -5999,9 +6009,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3F65BF0A-CC8F-4A4B-9FD4-7FC7066424F6" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B991D515-9072-488F-B338-D7776C70FB62" } ] } @@ -6010,17 +6020,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8EA0D645-80F6-48C3-AF0D-99198ADC8778" - } - ] - }, { "operator": "OR", "negate": false, @@ -6031,23 +6030,23 @@ "matchCriteriaId": "814FF3F3-CD5A-45A3-988C-6457D2CEB48C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sdx12_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "96A47E68-0271-4735-857E-688196CDDDC6" + "criteria": "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8EA0D645-80F6-48C3-AF0D-99198ADC8778" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6058,6 +6057,17 @@ "matchCriteriaId": "71A0B91A-289F-4151-9C75-3C06DFA8B219" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx12_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96A47E68-0271-4735-857E-688196CDDDC6" + } + ] } ] }, @@ -6069,9 +6079,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A0CE1B23-6FE3-41C4-B264-C7A9E8BDBEC1" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "794BA13C-3C63-4695-AA45-676F85D904BE" } ] }, @@ -6080,9 +6090,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", - "matchCriteriaId": "794BA13C-3C63-4695-AA45-676F85D904BE" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0CE1B23-6FE3-41C4-B264-C7A9E8BDBEC1" } ] } @@ -6744,9 +6754,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FC012AD0-BCEE-4B1E-9B15-5D77D78CEA01" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F51C69B9-F0AB-4BF5-A8C2-64FEB7075593" } ] }, @@ -6755,9 +6765,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F51C69B9-F0AB-4BF5-A8C2-64FEB7075593" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC012AD0-BCEE-4B1E-9B15-5D77D78CEA01" } ] } @@ -6771,9 +6781,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC" } ] }, @@ -6782,9 +6792,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" } ] } diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40532.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40532.json index 58262cfd6ee..15be4451cb5 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40532.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40532.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40532", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:20.140", - "lastModified": "2023-04-24T15:14:35.607", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:37.663", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-190" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ @@ -75,9 +85,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" } ] }, @@ -86,9 +96,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" } ] } @@ -97,17 +107,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:9205_lte_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "920F873B-F52D-4754-9726-BECCAD0CAC45" - } - ] - }, { "operator": "OR", "negate": false, @@ -118,6 +117,17 @@ "matchCriteriaId": "5EB573E2-C2B9-4B12-9EEF-9152FBFE3927" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:9205_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "920F873B-F52D-4754-9726-BECCAD0CAC45" + } + ] } ] }, @@ -129,9 +139,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:apq8016_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "81301BE5-3FA9-4053-97BC-11A9C10E196D" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:apq8016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6E79D48-F105-4D64-8C8F-88FE0345F5E1" } ] }, @@ -140,9 +150,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:apq8016:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F6E79D48-F105-4D64-8C8F-88FE0345F5E1" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:apq8016_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81301BE5-3FA9-4053-97BC-11A9C10E196D" } ] } @@ -3315,9 +3325,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2AD0E09B-92EC-4974-BC5F-66C3AAF586B1" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBA48AB-85F4-4D6C-B811-87756B80FFB8" } ] }, @@ -3326,9 +3336,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3FBA48AB-85F4-4D6C-B811-87756B80FFB8" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AD0E09B-92EC-4974-BC5F-66C3AAF586B1" } ] } @@ -3337,17 +3347,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A" - } - ] - }, { "operator": "OR", "negate": false, @@ -3358,6 +3357,17 @@ "matchCriteriaId": "98E58C63-F253-4DCC-8A14-48FEB64B4C3D" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A" + } + ] } ] }, @@ -3369,9 +3379,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "25565FDA-651D-4A05-8B1E-2188B6921253" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8D49750-BBEA-4A3D-9898-28B7A50A7F42" } ] }, @@ -3380,9 +3390,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B8D49750-BBEA-4A3D-9898-28B7A50A7F42" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25565FDA-651D-4A05-8B1E-2188B6921253" } ] } @@ -4476,9 +4486,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B" } ] }, @@ -4487,9 +4497,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" } ] } @@ -4498,17 +4508,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "36A10EB2-E7A2-461F-836E-FC38B9428C98" - } - ] - }, { "operator": "OR", "negate": false, @@ -4519,23 +4518,23 @@ "matchCriteriaId": "A457C1D6-A026-4B5F-9CB1-FA795785A515" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + "criteria": "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36A10EB2-E7A2-461F-836E-FC38B9428C98" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4546,23 +4545,23 @@ "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2C10CAAC-FD93-4116-9F0C-E983B3693FAF" + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4573,6 +4572,17 @@ "matchCriteriaId": "9FEC2402-BA39-49BB-A34C-FF32ED44A158" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C10CAAC-FD93-4116-9F0C-E983B3693FAF" + } + ] } ] }, @@ -4584,9 +4594,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "809FD84D-11C5-4EE3-B830-62CF5F6CB1BC" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFD77A52-D53C-424F-9E17-160B710469C3" } ] }, @@ -4595,9 +4605,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DFD77A52-D53C-424F-9E17-160B710469C3" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "809FD84D-11C5-4EE3-B830-62CF5F6CB1BC" } ] } @@ -4881,9 +4891,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25" } ] }, @@ -4892,9 +4902,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" } ] } @@ -4903,17 +4913,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" - } - ] - }, { "operator": "OR", "negate": false, @@ -4924,23 +4923,23 @@ "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8C194363-7FDE-43C9-B6FE-2BD6B474816F" + "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4951,23 +4950,23 @@ "matchCriteriaId": "B8CC9433-6B33-4B9C-8EC3-BBBB43897E5C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1894F6B9-31DA-44E8-AA28-064F73EBEE8D" + "criteria": "cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C194363-7FDE-43C9-B6FE-2BD6B474816F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4978,23 +4977,23 @@ "matchCriteriaId": "8AA23845-D9F5-4035-8A93-F475D865586F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qsw8573_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8A3A1C47-E5F6-4211-A165-D4735FCEE9CB" + "criteria": "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1894F6B9-31DA-44E8-AA28-064F73EBEE8D" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5005,23 +5004,23 @@ "matchCriteriaId": "6BC1FD31-5D16-4901-8C83-F8882A6476E0" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qts110_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B2D4B026-2118-448D-A48D-36864DE715B8" + "criteria": "cpe:2.3:o:qualcomm:qsw8573_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A3A1C47-E5F6-4211-A165-D4735FCEE9CB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5032,23 +5031,23 @@ "matchCriteriaId": "5ED10480-E005-452C-A03C-D669CE94ABE4" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:8905_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "018C0E3A-1FA9-48B8-8697-92944B01DEF0" + "criteria": "cpe:2.3:o:qualcomm:qts110_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2D4B026-2118-448D-A48D-36864DE715B8" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5059,23 +5058,23 @@ "matchCriteriaId": "DCB14FE2-9C61-4CD1-B8D1-DBF44FC89163" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F18CD1F1-C36A-4840-88CD-8F00BD68EF1A" + "criteria": "cpe:2.3:o:qualcomm:8905_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "018C0E3A-1FA9-48B8-8697-92944B01DEF0" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5086,23 +5085,23 @@ "matchCriteriaId": "6A01800E-994E-4095-AD86-F02DC9D9C86E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sda\\/sdm845_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D5634C93-0C39-43B6-A185-77CE005B7305" + "criteria": "cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F18CD1F1-C36A-4840-88CD-8F00BD68EF1A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5113,23 +5112,23 @@ "matchCriteriaId": "0ED618D9-DFDD-4306-BF6D-5D5636B60353" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "89A1AAD0-9336-4657-8E1E-74E8F490C06E" + "criteria": "cpe:2.3:o:qualcomm:sda\\/sdm845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5634C93-0C39-43B6-A185-77CE005B7305" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5140,23 +5139,23 @@ "matchCriteriaId": "386F2F37-974B-40F2-9B23-ABD49C60E32D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931" + "criteria": "cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89A1AAD0-9336-4657-8E1E-74E8F490C06E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5167,6 +5166,17 @@ "matchCriteriaId": "A558A868-1B67-48D2-8A94-FDEA7126FAE7" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931" + } + ] } ] }, @@ -5178,9 +5188,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" } ] }, @@ -5189,9 +5199,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" } ] } @@ -5340,9 +5350,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739" } ] }, @@ -5351,9 +5361,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", - "matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B" } ] } @@ -5362,17 +5372,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" - } - ] - }, { "operator": "OR", "negate": false, @@ -5383,23 +5382,23 @@ "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5410,6 +5409,17 @@ "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] } ] }, @@ -5421,9 +5431,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14" } ] }, @@ -5432,9 +5442,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" } ] } @@ -7716,9 +7726,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B3ADE826-C55D-4731-80B9-164FEA290FAC" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED4F8FE-32DB-4696-A3AD-A9D7CB7E513A" } ] }, @@ -7727,9 +7737,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8ED4F8FE-32DB-4696-A3AD-A9D7CB7E513A" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3ADE826-C55D-4731-80B9-164FEA290FAC" } ] } @@ -7738,17 +7748,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9286B1E8-E39F-4DAA-8969-311CA2A0A8AA" - } - ] - }, { "operator": "OR", "negate": false, @@ -7759,23 +7758,23 @@ "matchCriteriaId": "19B9AE36-87A9-4EE7-87C8-CCA2DCF51039" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm8150-ac_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DC335397-8340-4DD4-B8D1-9AB6E9911F85" + "criteria": "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9286B1E8-E39F-4DAA-8969-311CA2A0A8AA" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -7786,23 +7785,23 @@ "matchCriteriaId": "CB6CF9F9-8EEE-49AD-B17D-60470F2F9D57" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DDC730C6-FB32-4566-AAE2-B2B261BA9411" + "criteria": "cpe:2.3:o:qualcomm:sm8150-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC335397-8340-4DD4-B8D1-9AB6E9911F85" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -7813,6 +7812,17 @@ "matchCriteriaId": "5A432773-467F-492C-AA3A-ADF08A21FB3F" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDC730C6-FB32-4566-AAE2-B2B261BA9411" + } + ] } ] }, @@ -7824,9 +7834,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm8250-ab_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2723E7F4-1381-4542-83BA-E65728F6CA5B" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8250-ab:-:*:*:*:*:*:*:*", + "matchCriteriaId": "918F0BEB-A38E-4801-ADE2-280D26F9A87C" } ] }, @@ -7835,9 +7845,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sm8250-ab:-:*:*:*:*:*:*:*", - "matchCriteriaId": "918F0BEB-A38E-4801-ADE2-280D26F9A87C" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8250-ab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2723E7F4-1381-4542-83BA-E65728F6CA5B" } ] } @@ -8040,9 +8050,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_2100_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C19F8862-65F2-4A80-82DB-44B312C377A9" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_2100_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07A533FB-1A79-4D28-8C4C-C0E5D59E09B4" } ] }, @@ -8051,9 +8061,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_2100_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "07A533FB-1A79-4D28-8C4C-C0E5D59E09B4" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_2100_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C19F8862-65F2-4A80-82DB-44B312C377A9" } ] } @@ -8062,17 +8072,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_2500_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2317B9C5-14FE-4B54-AA6C-3F41B2B15A04" - } - ] - }, { "operator": "OR", "negate": false, @@ -8083,23 +8082,23 @@ "matchCriteriaId": "2EDA8707-6BB7-4749-B4FF-3282FB0A6AFA" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_3100_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "93A4124C-EED1-41C3-9A83-D96A69A6D33E" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_2500_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2317B9C5-14FE-4B54-AA6C-3F41B2B15A04" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -8110,6 +8109,17 @@ "matchCriteriaId": "8B22D352-11A6-493C-82E2-D33DA414F715" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_3100_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93A4124C-EED1-41C3-9A83-D96A69A6D33E" + } + ] } ] }, @@ -8121,9 +8131,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_4100\\+_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "79AFE82F-12C5-4B2E-9004-52F68C965F70" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_4100\\+_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B5CD77E-1AFD-4AB4-A752-7AAE195E6324" } ] }, @@ -8132,9 +8142,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_4100\\+_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7B5CD77E-1AFD-4AB4-A752-7AAE195E6324" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_4100\\+_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79AFE82F-12C5-4B2E-9004-52F68C965F70" } ] } diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40533.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40533.json index 56aa3c2f55c..2bd9b1c0aef 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40533.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40533.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40533", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:11.603", - "lastModified": "2023-06-10T02:08:50.747", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:38.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-119" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40534.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40534.json index 91cdc683c13..44c71e96b05 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40534.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40534.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40534", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.157", - "lastModified": "2023-09-08T16:43:39.697", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:38.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-129" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40535.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40535.json index ec377478980..95c0ee99902 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40535.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40535.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40535", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:12.673", - "lastModified": "2023-03-16T16:46:07.287", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:39.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40536.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40536.json index 0168c2a42c7..1749f22b9c0 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40536.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40536.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40536", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:11.680", - "lastModified": "2023-06-10T02:08:58.893", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:39.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-287" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40537.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40537.json index d1173d6583a..b9c8ddf2e49 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40537.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40537.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40537", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:12.753", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:39.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-129" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40538.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40538.json index 823f453ad05..9822004fb8d 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40538.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40538.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40538", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:11.850", - "lastModified": "2023-06-10T02:09:06.670", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:40.043", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ @@ -75,9 +85,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" } ] }, @@ -86,9 +96,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" } ] } @@ -97,17 +107,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn685x-5_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2A3CF46D-E1CB-447E-8371-15C3F49B1AA9" - } - ] - }, { "operator": "OR", "negate": false, @@ -118,23 +117,23 @@ "matchCriteriaId": "B74FDAF1-82D0-4136-BF97-25C56FCEE77C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn685x-1_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A07C2049-B227-4849-85D0-B53D690C7697" + "criteria": "cpe:2.3:o:qualcomm:wcn685x-5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A3CF46D-E1CB-447E-8371-15C3F49B1AA9" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -145,23 +144,23 @@ "matchCriteriaId": "88D2DB07-B72B-4D44-A373-0C7EAB35F388" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn785x-1_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C41266FF-5555-4522-AD55-6A7CF8BA33D5" + "criteria": "cpe:2.3:o:qualcomm:wcn685x-1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A07C2049-B227-4849-85D0-B53D690C7697" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -172,23 +171,23 @@ "matchCriteriaId": "9E9C428C-7470-4178-9029-3234086D93F1" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn785x-5_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "04EA12D4-24E2-4FE9-8CD6-06A8E36DEB2F" + "criteria": "cpe:2.3:o:qualcomm:wcn785x-1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C41266FF-5555-4522-AD55-6A7CF8BA33D5" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -199,23 +198,23 @@ "matchCriteriaId": "2AED978B-0330-4B9B-B662-AA8E9E621996" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + "criteria": "cpe:2.3:o:qualcomm:wcn785x-5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04EA12D4-24E2-4FE9-8CD6-06A8E36DEB2F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -226,6 +225,17 @@ "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] } ] }, @@ -237,9 +247,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED" } ] }, @@ -248,9 +258,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", - "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" } ] } diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40539.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40539.json index e64e9d07375..c68a3794a4b 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40539.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40539.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40539", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:12.820", - "lastModified": "2023-03-16T16:09:03.290", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:40.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-129" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40540.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40540.json index 1179c22bb86..9a106d0d58f 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40540.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40540.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40540", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-03-10T21:15:12.887", - "lastModified": "2024-03-25T05:15:48.463", + "lastModified": "2024-04-12T17:16:40.523", "vulnStatus": "Modified", "descriptions": [ { @@ -64,6 +64,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ @@ -291,9 +301,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3293739B-53D5-48C1-BC3A-FAA74D6C7954" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E650C510-037F-47DB-A486-EBF871C73278" } ] }, @@ -302,9 +312,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E650C510-037F-47DB-A486-EBF871C73278" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3293739B-53D5-48C1-BC3A-FAA74D6C7954" } ] } @@ -313,17 +323,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DD031A8D-A48A-4363-8C00-C1FF5458D0FB" - } - ] - }, { "operator": "OR", "negate": false, @@ -334,23 +333,23 @@ "matchCriteriaId": "64F5D7CA-6F31-4842-AC66-EB975C19C83D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "180EB150-C114-429D-941F-9B99CDA4F810" + "criteria": "cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD031A8D-A48A-4363-8C00-C1FF5458D0FB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -361,23 +360,23 @@ "matchCriteriaId": "93BA62AF-3555-463A-8B51-76F07BF0B87E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "54C616C5-6480-4FE0-9A1C-08026CCB08D8" + "criteria": "cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "180EB150-C114-429D-941F-9B99CDA4F810" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -388,23 +387,23 @@ "matchCriteriaId": "7D8E02BA-3A7E-4B13-A8D7-20FD0FAE3187" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "16EB11D8-27A3-4D04-B863-7FD4549D0BCD" + "criteria": "cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54C616C5-6480-4FE0-9A1C-08026CCB08D8" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -415,23 +414,23 @@ "matchCriteriaId": "CF9B5B84-3C57-4D3D-AFF0-958A19DE09E8" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2FFC44DC-DA90-45F5-ACC1-5262D3E3A796" + "criteria": "cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16EB11D8-27A3-4D04-B863-7FD4549D0BCD" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -442,23 +441,23 @@ "matchCriteriaId": "EE9D9A56-2157-43F0-BB18-2B7249D7E021" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + "criteria": "cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FFC44DC-DA90-45F5-ACC1-5262D3E3A796" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -469,6 +468,17 @@ "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] } ] }, @@ -480,9 +490,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" } ] }, @@ -491,9 +501,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" } ] } diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21624.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21624.json index 2c442f23bfa..50484fe851c 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21624.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21624.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21624", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:09.893", - "lastModified": "2023-07-10T17:27:39.443", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:40.783", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21625.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21625.json index 344c16e5208..87cec63f4ce 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21625.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21625.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21625", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:13.057", - "lastModified": "2023-08-10T17:24:21.607", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:41.180", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21626.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21626.json index 126ea2095d0..a86f5fc5465 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21626.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21626.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21626", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:13.137", - "lastModified": "2023-08-10T17:23:26.837", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:41.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-287" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-320" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21627.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21627.json index 837d5fb8c30..bafbcf16e62 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21627.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21627.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21627", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:13.220", - "lastModified": "2023-08-10T17:20:44.040", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:41.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-704" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21628.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21628.json index ce95abfa2be..0a545b8fad1 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21628.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21628.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21628", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:11.963", - "lastModified": "2023-06-10T02:09:10.987", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:42.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ @@ -3072,9 +3082,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "93BA2DC9-5B4F-4F8F-8B3D-8DA01043B9BD" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FA8880F-E513-4390-B839-C5D86E7A89EB" } ] }, @@ -3083,9 +3093,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8FA8880F-E513-4390-B839-C5D86E7A89EB" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93BA2DC9-5B4F-4F8F-8B3D-8DA01043B9BD" } ] } @@ -3094,17 +3104,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca9985_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "ED6C33CE-635A-415F-9F4E-70E2D86A06D3" - } - ] - }, { "operator": "OR", "negate": false, @@ -3115,23 +3114,23 @@ "matchCriteriaId": "124FF4F3-0490-4CB8-8689-5F0FA6D9230F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca9986_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "70DBC461-DFD7-419E-8241-B55913315D45" + "criteria": "cpe:2.3:o:qualcomm:qca9985_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED6C33CE-635A-415F-9F4E-70E2D86A06D3" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3142,23 +3141,23 @@ "matchCriteriaId": "4E9EC919-0F83-49F3-807B-CD4B27AAE741" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca9990_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "991D9592-D61E-4777-8B59-EB004F09998E" + "criteria": "cpe:2.3:o:qualcomm:qca9986_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70DBC461-DFD7-419E-8241-B55913315D45" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3169,23 +3168,23 @@ "matchCriteriaId": "37A829C8-5BA3-4B13-9033-30FCD5B78B70" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca9992_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5D8FB66C-5616-4C3A-9CAE-7610519ACA1A" + "criteria": "cpe:2.3:o:qualcomm:qca9990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "991D9592-D61E-4777-8B59-EB004F09998E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3196,23 +3195,23 @@ "matchCriteriaId": "408C8494-E7D8-4F99-9B04-7E84A31C799B" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca9994_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5B18AA-0699-4F21-9D3E-C45B071B4903" + "criteria": "cpe:2.3:o:qualcomm:qca9992_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D8FB66C-5616-4C3A-9CAE-7610519ACA1A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3223,23 +3222,23 @@ "matchCriteriaId": "DDC4C800-C9E3-4DB0-AE99-3F75D3660DEC" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092" + "criteria": "cpe:2.3:o:qualcomm:qca9994_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD5B18AA-0699-4F21-9D3E-C45B071B4903" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3250,23 +3249,23 @@ "matchCriteriaId": "214A053F-D80C-4AD9-B4F1-83384095A3F3" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8" + "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3277,23 +3276,23 @@ "matchCriteriaId": "74EBA77E-69A5-4145-9BEC-CD39BA132309" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F" + "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3304,23 +3303,23 @@ "matchCriteriaId": "163FE96E-DF5B-4B67-8EDE-44A5B9A8492D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3331,23 +3330,23 @@ "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B" + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3358,6 +3357,17 @@ "matchCriteriaId": "FBB16DC4-CDC9-4936-9C6A-0ED8E1F6D056" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B" + } + ] } ] }, @@ -3369,9 +3379,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn5021_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B0F7D48A-7D06-46C5-A093-FAA12666A666" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5021:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58DF7FA9-72B4-454D-AED7-ED9531B118BC" } ] }, @@ -3380,9 +3390,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcn5021:-:*:*:*:*:*:*:*", - "matchCriteriaId": "58DF7FA9-72B4-454D-AED7-ED9531B118BC" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5021_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0F7D48A-7D06-46C5-A093-FAA12666A666" } ] } @@ -4584,9 +4594,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" } ] }, @@ -4595,9 +4605,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" } ] } @@ -4606,17 +4616,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" - } - ] - }, { "operator": "OR", "negate": false, @@ -4627,23 +4626,23 @@ "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95" + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4654,6 +4653,17 @@ "matchCriteriaId": "C819454D-D413-478A-B78D-CFF6994803A1" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95" + } + ] } ] }, @@ -4665,9 +4675,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd_455_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B3EF9964-D615-473E-A289-8A01D91D87AA" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_455:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C177163-B6E6-42D8-8969-C2F9832C6701" } ] }, @@ -4676,9 +4686,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sd_455:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9C177163-B6E6-42D8-8969-C2F9832C6701" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_455_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3EF9964-D615-473E-A289-8A01D91D87AA" } ] } @@ -5691,9 +5701,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm6350_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "80E5A7CE-9356-4E00-8458-52C60CB34753" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "571CC514-7B65-4769-9921-149ABFF2FE74" } ] }, @@ -5702,9 +5712,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sm6350:-:*:*:*:*:*:*:*", - "matchCriteriaId": "571CC514-7B65-4769-9921-149ABFF2FE74" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E5A7CE-9356-4E00-8458-52C60CB34753" } ] } @@ -5713,17 +5723,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm6375_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "737807F6-F62C-4EC5-903A-0BA996834164" - } - ] - }, { "operator": "OR", "negate": false, @@ -5734,6 +5733,17 @@ "matchCriteriaId": "5B79990C-AAD2-4A91-A806-E449838054BA" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "737807F6-F62C-4EC5-903A-0BA996834164" + } + ] } ] }, @@ -5745,9 +5755,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D045BE4B-BC19-4A51-90E6-00C18389C81B" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F006960-CDE3-4E74-B4F0-2C4B2CA93959" } ] }, @@ -5756,9 +5766,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4F006960-CDE3-4E74-B4F0-2C4B2CA93959" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D045BE4B-BC19-4A51-90E6-00C18389C81B" } ] } @@ -6636,9 +6646,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001" } ] }, @@ -6647,9 +6657,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" } ] } @@ -6658,17 +6668,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "05396B5E-C70F-4D83-84AA-7A7DB1B7B0E4" - } - ] - }, { "operator": "OR", "negate": false, @@ -6679,23 +6678,23 @@ "matchCriteriaId": "6E180EE7-5254-4C57-B4EE-BF2A9C21CA94" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_x20_lte_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6D256F6F-3AF7-4337-9651-A012B70C95D0" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05396B5E-C70F-4D83-84AA-7A7DB1B7B0E4" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6706,23 +6705,23 @@ "matchCriteriaId": "CDE027C8-1A5E-4247-A2C7-84A4A11EAB6C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_x24_lte_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5CAB1351-A614-4E73-B58E-7D624695C657" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x20_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D256F6F-3AF7-4337-9651-A012B70C95D0" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6733,6 +6732,17 @@ "matchCriteriaId": "4494AAD7-D132-41DB-9756-CAD1F3F7AE7E" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x24_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CAB1351-A614-4E73-B58E-7D624695C657" + } + ] } ] }, @@ -6744,9 +6754,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_x5_lte_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "312A5688-2508-4609-835F-F0957C511AE8" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x5_lte_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6DFCE-2D24-4A68-8B46-FB47ABEC6694" } ] }, @@ -6755,9 +6765,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_x5_lte_modem:-:*:*:*:*:*:*:*", - "matchCriteriaId": "ADD6DFCE-2D24-4A68-8B46-FB47ABEC6694" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x5_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "312A5688-2508-4609-835F-F0957C511AE8" } ] } diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21629.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21629.json index db30b27521d..9a86f4b3bdc 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21629.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21629.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21629", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.040", - "lastModified": "2023-07-10T17:36:44.123", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:42.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-415" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] } ], "configurations": [ @@ -237,9 +247,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237" } ] }, @@ -248,9 +258,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" } ] } @@ -259,17 +269,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" - } - ] - }, { "operator": "OR", "negate": false, @@ -280,23 +279,23 @@ "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3" + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -307,23 +306,23 @@ "matchCriteriaId": "770F3924-BE27-4BDE-B922-680B3C9753EB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -334,23 +333,23 @@ "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -361,23 +360,23 @@ "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -388,23 +387,23 @@ "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -415,23 +414,23 @@ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -442,23 +441,23 @@ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BA44E1D7-C4B5-4A1C-8D89-C080856104EE" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -469,23 +468,23 @@ "matchCriteriaId": "268F94E5-15A2-4BCA-BE1B-0B6A7179B9C9" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507" + "criteria": "cpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA44E1D7-C4B5-4A1C-8D89-C080856104EE" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -496,23 +495,23 @@ "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2C8807E9-5972-47E7-8B39-2E4D68C7B79E" + "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -523,6 +522,17 @@ "matchCriteriaId": "57963412-14B9-4C0D-AA0D-6928445DB808" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C8807E9-5972-47E7-8B39-2E4D68C7B79E" + } + ] } ] }, @@ -534,9 +544,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:msm8209_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "29F64FA7-5EA1-4C91-B409-4A0E966FBD26" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FBCA5AB-07E4-404E-A278-28F6004D2126" } ] }, @@ -545,9 +555,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1FBCA5AB-07E4-404E-A278-28F6004D2126" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8209_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29F64FA7-5EA1-4C91-B409-4A0E966FBD26" } ] } @@ -804,9 +814,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D" } ] }, @@ -815,9 +825,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" } ] } @@ -831,9 +841,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D" } ] }, @@ -842,9 +852,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" } ] } @@ -5529,9 +5539,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" } ] }, @@ -5540,9 +5550,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", - "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" } ] } @@ -5551,17 +5561,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" - } - ] - }, { "operator": "OR", "negate": false, @@ -5572,23 +5571,23 @@ "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5599,23 +5598,23 @@ "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5626,23 +5625,23 @@ "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5653,23 +5652,23 @@ "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5680,23 +5679,23 @@ "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5707,23 +5706,23 @@ "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5734,23 +5733,23 @@ "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5761,6 +5760,17 @@ "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] } ] }, @@ -5772,9 +5782,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" } ] }, @@ -5783,9 +5793,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" } ] } diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21630.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21630.json index 777880639da..b1495fc2f26 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21630.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21630.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21630", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-04-13T07:15:21.213", - "lastModified": "2023-04-24T15:00:16.880", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:43.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-190" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21631.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21631.json index 7726488cf37..be194530b9d 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21631.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21631.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21631", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.110", - "lastModified": "2023-07-10T17:37:30.247", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:43.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21632.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21632.json index 9af48a79f9f..2a6a7df9e21 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21632.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21632.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21632", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:12.037", - "lastModified": "2023-06-10T02:09:14.953", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:43.513", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21633.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21633.json index 5cad3e44736..2d4b81b8c3a 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21633.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21633.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21633", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.173", - "lastModified": "2023-07-10T17:38:21.223", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:43.673", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21634.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21634.json index 9419c6fe45e..ef24bbcead9 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21634.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21634.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21634", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:08.120", - "lastModified": "2023-12-11T13:09:57.307", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:08.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21635.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21635.json index ceb1fcaf613..f3538569cea 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21635.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21635.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21635", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.230", - "lastModified": "2023-07-10T23:27:42.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:43.857", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21636.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21636.json index 33c8c07f07e..b60af27af2d 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21636.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21636.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21636", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.247", - "lastModified": "2023-09-08T16:43:04.713", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:44.023", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-129" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21637.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21637.json index bdd7becb81a..a26d66f1342 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21637.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21637.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21637", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.287", - "lastModified": "2023-07-10T23:31:13.807", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:44.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21638.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21638.json index 956bf6f801a..aaeca3cf64b 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21638.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21638.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21638", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.343", - "lastModified": "2023-07-10T23:32:10.557", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:44.373", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-704" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-704" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21639.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21639.json index e4799b2fd83..6bd3f64fd26 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21639.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21639.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21639", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.397", - "lastModified": "2023-07-11T13:30:52.440", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:44.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ @@ -75,9 +85,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" } ] }, @@ -86,9 +96,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" } ] } diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21640.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21640.json index fef52339b18..49ac7a436cd 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21640.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21640.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21640", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.450", - "lastModified": "2023-07-10T23:38:21.937", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:44.853", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21641.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21641.json index d5797818ede..81701a7a565 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21641.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21641.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21641", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.513", - "lastModified": "2023-07-11T13:45:52.017", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:45.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-264" + } + ] } ], "configurations": [ @@ -75,9 +85,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" } ] }, @@ -86,9 +96,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" } ] } @@ -97,17 +107,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" - } - ] - }, { "operator": "OR", "negate": false, @@ -118,23 +117,23 @@ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -145,23 +144,23 @@ "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -172,6 +171,17 @@ "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] } ] }, @@ -183,9 +193,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" } ] }, @@ -194,9 +204,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" } ] } diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21642.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21642.json index 31f8b5da336..86e898b7758 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21642.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21642.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21642", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:10.347", - "lastModified": "2023-05-09T16:32:01.093", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:45.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ @@ -75,9 +85,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" } ] }, @@ -86,9 +96,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" } ] } @@ -97,17 +107,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" - } - ] - }, { "operator": "OR", "negate": false, @@ -118,23 +117,23 @@ "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -145,23 +144,23 @@ "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -172,23 +171,23 @@ "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -199,6 +198,17 @@ "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] } ] }, @@ -210,9 +220,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" } ] }, @@ -221,9 +231,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" } ] } diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21643.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21643.json index 2c24b0b4bd6..76aaa5e5cbd 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21643.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21643.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21643", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:13.303", - "lastModified": "2023-08-10T17:14:19.857", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:45.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21644.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21644.json index 17782255bc5..152770a2ef5 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21644.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21644.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21644", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.327", - "lastModified": "2023-09-08T16:42:47.987", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:45.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-190" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-680" + } + ] } ], "configurations": [ @@ -241,9 +251,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3" } ] }, @@ -252,9 +262,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" } ] } @@ -263,17 +273,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" - } - ] - }, { "operator": "OR", "negate": false, @@ -284,23 +283,23 @@ "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -311,23 +310,23 @@ "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -338,23 +337,23 @@ "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -365,23 +364,23 @@ "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcc5100_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "58C4A954-9822-4B21-9221-C21031AD4180" + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -392,23 +391,23 @@ "matchCriteriaId": "0B1614E0-A51C-47DA-BBE1-89BF538D396E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "02A2DB6A-7137-4D3D-9D6E-B9B0D0376758" + "criteria": "cpe:2.3:o:qualcomm:qcc5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58C4A954-9822-4B21-9221-C21031AD4180" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -419,23 +418,23 @@ "matchCriteriaId": "5BE4F498-4C58-4DCC-B7D8-1B461177D083" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + "criteria": "cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02A2DB6A-7137-4D3D-9D6E-B9B0D0376758" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -446,23 +445,23 @@ "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -473,23 +472,23 @@ "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -500,23 +499,23 @@ "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -527,6 +526,17 @@ "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] } ] }, @@ -538,9 +548,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B" } ] }, @@ -549,9 +559,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" } ] } diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21646.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21646.json index b8b71fd6030..b570b8c81be 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21646.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21646.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21646", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.410", - "lastModified": "2023-09-08T16:42:30.267", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:46.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21647.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21647.json index b1bd0559c04..29b80f02d6a 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21647.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21647.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21647", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:13.393", - "lastModified": "2023-08-10T15:49:12.090", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:46.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-20" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21648.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21648.json index 36874535f7e..245b2dffda7 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21648.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21648.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21648", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:13.480", - "lastModified": "2023-08-10T15:48:58.277", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:46.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-680" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21649.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21649.json index 948ff44810a..cab79379027 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21649.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21649.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21649", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:13.563", - "lastModified": "2023-08-10T15:48:30.060", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:46.693", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21650.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21650.json index 907f2fccada..ff0519ded60 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21650.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21650.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21650", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:13.643", - "lastModified": "2023-08-10T15:48:22.757", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:46.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21651.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21651.json index 43762135dd0..4e502b92d2c 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21651.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21651.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21651", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:13.727", - "lastModified": "2023-08-10T15:48:01.903", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:47.207", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-704" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-704" + } + ] } ], "configurations": [ @@ -133,9 +143,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" } ] }, @@ -144,9 +154,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" } ] } @@ -2104,9 +2114,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A7EFE86D-A9B6-462C-BAD7-16E366A62344" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C1558857-DC78-4F88-9DB1-7474DD341D80" } ] }, @@ -2115,9 +2125,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C1558857-DC78-4F88-9DB1-7474DD341D80" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7EFE86D-A9B6-462C-BAD7-16E366A62344" } ] } @@ -2126,17 +2136,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd695_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "342B019D-CBE6-49C7-84F1-6E83C63F1891" - } - ] - }, { "operator": "OR", "negate": false, @@ -2147,23 +2146,23 @@ "matchCriteriaId": "E1536231-1573-4385-9659-318C1B797E5B" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9D74F875-F042-4F2A-8556-1FA875E7BA55" + "criteria": "cpe:2.3:o:qualcomm:sd695_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "342B019D-CBE6-49C7-84F1-6E83C63F1891" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2174,23 +2173,23 @@ "matchCriteriaId": "38A29739-DC41-4DEB-8613-26DECA4B4013" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C27A1EE0-EACE-4516-8423-A404E007DEC6" + "criteria": "cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D74F875-F042-4F2A-8556-1FA875E7BA55" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2201,23 +2200,23 @@ "matchCriteriaId": "CF1560D8-14F6-4FD8-B83A-2023BB792065" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "40CAEB7F-1E1A-43CC-8663-171108DA27D0" + "criteria": "cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C27A1EE0-EACE-4516-8423-A404E007DEC6" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2228,23 +2227,23 @@ "matchCriteriaId": "CDE196A0-AB55-4A5B-A1D6-630706310163" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7E170AD8-2723-42AA-9350-344874C4AC8A" + "criteria": "cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40CAEB7F-1E1A-43CC-8663-171108DA27D0" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2255,23 +2254,23 @@ "matchCriteriaId": "13D505D9-E00B-4934-AD85-E5EA2921FD50" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "13286F2B-0FD1-474A-A632-1AA19B110536" + "criteria": "cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E170AD8-2723-42AA-9350-344874C4AC8A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2282,23 +2281,23 @@ "matchCriteriaId": "F6EA3F98-0F45-44D3-9305-4F548B437011" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2D52BC3A-6822-43B9-8CEA-2659481A9BA0" + "criteria": "cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13286F2B-0FD1-474A-A632-1AA19B110536" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2309,23 +2308,23 @@ "matchCriteriaId": "CC954854-0407-402B-8013-FAF53F1F5DC7" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB222869-9CDB-43B1-8947-954C8C8520B8" + "criteria": "cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D52BC3A-6822-43B9-8CEA-2659481A9BA0" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2336,23 +2335,23 @@ "matchCriteriaId": "306DAB18-F737-47DE-A47D-C39F1B25D515" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd850_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B1CA3237-5F9A-4490-A66B-853BE9310028" + "criteria": "cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB222869-9CDB-43B1-8947-954C8C8520B8" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2363,6 +2362,17 @@ "matchCriteriaId": "B8F3601C-A801-4EBD-BDCC-2B84898DFBEA" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd850_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1CA3237-5F9A-4490-A66B-853BE9310028" + } + ] } ] }, @@ -2374,9 +2384,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C" } ] }, @@ -2385,9 +2395,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" } ] } diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21652.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21652.json index 9c24432867d..346a90b983e 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21652.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21652.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21652", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:13.803", - "lastModified": "2023-08-10T15:47:48.503", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:47.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-798" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-320" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21653.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21653.json index 0aff583476e..05ddf4bb92e 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21653.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21653.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21653", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.490", - "lastModified": "2023-09-08T16:42:04.677", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:47.867", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21654.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21654.json index e92c7e00c0d..1f82835a882 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21654.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21654.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21654", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.570", - "lastModified": "2023-09-08T16:39:52.437", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:48.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21655.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21655.json index 3e4044e7838..c6c808d0258 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21655.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21655.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21655", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.697", - "lastModified": "2023-09-08T16:38:57.013", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:48.177", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-190" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21656.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21656.json index 6a1ad1d7b28..82833b207f1 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21656.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21656.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21656", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:12.103", - "lastModified": "2023-06-10T02:09:22.893", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:48.340", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-20" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21657.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21657.json index 0f885f2ed51..7f1a57b59e6 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21657.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21657.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21657", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:12.180", - "lastModified": "2023-06-10T02:09:29.850", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:48.560", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-20" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21658.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21658.json index 7782d9043f5..0fd1ff0eff3 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21658.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21658.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21658", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:12.253", - "lastModified": "2023-06-10T02:09:53.430", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:48.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ @@ -75,9 +85,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" } ] }, @@ -86,9 +96,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" } ] } @@ -97,17 +107,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B032F871-3EC2-427D-A06F-681A58075925" - } - ] - }, { "operator": "OR", "negate": false, @@ -118,6 +117,17 @@ "matchCriteriaId": "73286FFB-C267-46B7-8FEF-C96534656AF9" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B032F871-3EC2-427D-A06F-681A58075925" + } + ] } ] }, @@ -129,9 +139,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AA32CC0-DE30-4B15-8EC6-1FAF14C5C4E2" } ] }, @@ -140,9 +150,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1AA32CC0-DE30-4B15-8EC6-1FAF14C5C4E2" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C" } ] } @@ -1452,9 +1462,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" } ] }, @@ -1463,9 +1473,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", - "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" } ] } @@ -1474,17 +1484,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" - } - ] - }, { "operator": "OR", "negate": false, @@ -1495,23 +1494,23 @@ "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1522,6 +1521,17 @@ "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] } ] }, @@ -1533,9 +1543,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9EB615F-FD4C-450B-AB25-E936FD9816C4" } ] }, @@ -1544,9 +1554,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C9EB615F-FD4C-450B-AB25-E936FD9816C4" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530" } ] } @@ -2100,9 +2110,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca9994_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BD5B18AA-0699-4F21-9D3E-C45B071B4903" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9994:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDC4C800-C9E3-4DB0-AE99-3F75D3660DEC" } ] }, @@ -2111,9 +2121,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca9994:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DDC4C800-C9E3-4DB0-AE99-3F75D3660DEC" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9994_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD5B18AA-0699-4F21-9D3E-C45B071B4903" } ] } @@ -3936,9 +3946,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA" } ] }, @@ -3947,9 +3957,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" } ] } @@ -3958,17 +3968,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" - } - ] - }, { "operator": "OR", "negate": false, @@ -3979,23 +3978,23 @@ "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4006,6 +4005,17 @@ "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + } + ] } ] }, @@ -4017,9 +4027,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" } ] }, @@ -4028,9 +4038,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" } ] } diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21659.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21659.json index 8538da57b80..1acfc4c9497 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21659.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21659.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21659", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:12.333", - "lastModified": "2023-06-10T02:09:44.423", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:49.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ @@ -1452,9 +1462,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca2065_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8C68AE99-4C8C-43AE-94AA-82632FD2BBE4" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca2065:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E255A21F-EC50-436F-81D9-8B2AC56D9BCE" } ] }, @@ -1463,9 +1473,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca2065:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E255A21F-EC50-436F-81D9-8B2AC56D9BCE" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca2065_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C68AE99-4C8C-43AE-94AA-82632FD2BBE4" } ] } @@ -5691,9 +5701,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9" } ] }, @@ -5702,9 +5712,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" } ] } @@ -5713,17 +5723,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm8475_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "73CB0B0B-8448-4961-85A3-BC32A8567A21" - } - ] - }, { "operator": "OR", "negate": false, @@ -5734,23 +5733,23 @@ "matchCriteriaId": "E626A19A-DBE3-4DE9-90DA-FA3F883FF3CF" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9286B1E8-E39F-4DAA-8969-311CA2A0A8AA" + "criteria": "cpe:2.3:o:qualcomm:sm8475_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73CB0B0B-8448-4961-85A3-BC32A8567A21" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5761,23 +5760,23 @@ "matchCriteriaId": "19B9AE36-87A9-4EE7-87C8-CCA2DCF51039" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm8150-ac_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DC335397-8340-4DD4-B8D1-9AB6E9911F85" + "criteria": "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9286B1E8-E39F-4DAA-8969-311CA2A0A8AA" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5788,6 +5787,17 @@ "matchCriteriaId": "CB6CF9F9-8EEE-49AD-B17D-60470F2F9D57" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8150-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC335397-8340-4DD4-B8D1-9AB6E9911F85" + } + ] } ] }, @@ -5799,9 +5809,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DDC730C6-FB32-4566-AAE2-B2B261BA9411" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A432773-467F-492C-AA3A-ADF08A21FB3F" } ] }, @@ -5810,9 +5820,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5A432773-467F-492C-AA3A-ADF08A21FB3F" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDC730C6-FB32-4566-AAE2-B2B261BA9411" } ] } @@ -6177,9 +6187,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sc8180xp-ab_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6EBD06A6-7156-4363-AECB-6CA872008B54" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180xp-ab:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFEBF216-405D-462B-9345-3146315F6744" } ] }, @@ -6188,9 +6198,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sc8180xp-ab:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FFEBF216-405D-462B-9345-3146315F6744" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180xp-ab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6EBD06A6-7156-4363-AECB-6CA872008B54" } ] } @@ -6199,17 +6209,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sc8280xp-ab_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CD602832-D779-4A1E-9CE6-5E720FB1C509" - } - ] - }, { "operator": "OR", "negate": false, @@ -6220,23 +6219,23 @@ "matchCriteriaId": "6E162204-0481-4508-96A0-BCD8D9954E46" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sc8280xp-bb_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "30FD02EE-E958-4189-AF2C-1691DABA7810" + "criteria": "cpe:2.3:o:qualcomm:sc8280xp-ab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD602832-D779-4A1E-9CE6-5E720FB1C509" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6247,23 +6246,23 @@ "matchCriteriaId": "6C28135D-DA47-4815-9240-EEEE4D42A101" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1" + "criteria": "cpe:2.3:o:qualcomm:sc8280xp-bb_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "30FD02EE-E958-4189-AF2C-1691DABA7810" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6274,23 +6273,23 @@ "matchCriteriaId": "FB6053F0-5E34-458A-B084-078E4D4F4021" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6301,23 +6300,23 @@ "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6328,23 +6327,23 @@ "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "69D1567F-D669-4415-9A08-110221EFA6BA" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6355,23 +6354,23 @@ "matchCriteriaId": "EF808C56-AD46-4351-9A46-6A2B6AAAB5BB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69D1567F-D669-4415-9A08-110221EFA6BA" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6382,23 +6381,23 @@ "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6409,23 +6408,23 @@ "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A1E1B7FD-39CD-42AB-A113-2AFB25B5F85B" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6436,23 +6435,23 @@ "matchCriteriaId": "C93EECE3-7A8A-4B58-A674-134040CE43FE" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1E1B7FD-39CD-42AB-A113-2AFB25B5F85B" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6463,23 +6462,23 @@ "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BF9740EB-F82E-42EA-993E-A393B05CC6BB" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6490,23 +6489,23 @@ "matchCriteriaId": "022A5532-03F7-4FB8-BA0D-4221178C9486" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF9740EB-F82E-42EA-993E-A393B05CC6BB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6517,23 +6516,23 @@ "matchCriteriaId": "2BA4BA00-C8D1-4DAC-8030-CB5EEC7D4591" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7" + "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6544,23 +6543,23 @@ "matchCriteriaId": "EDC270A7-205C-41EB-A2E5-2A381A16BFBB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6571,23 +6570,23 @@ "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6598,6 +6597,17 @@ "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] } ] }, @@ -6609,9 +6619,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CF839E24-6542-4C5D-A1B7-FD3BA00683CB" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9F12284-93E0-482D-9D35-EB38BA7D6C6D" } ] }, @@ -6620,9 +6630,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sxr1120:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E9F12284-93E0-482D-9D35-EB38BA7D6C6D" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF839E24-6542-4C5D-A1B7-FD3BA00683CB" } ] } @@ -7122,9 +7132,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" } ] }, @@ -7133,9 +7143,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" } ] } diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21660.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21660.json index 5bcc0744eb6..41ff0e1bb28 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21660.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21660.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21660", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:12.413", - "lastModified": "2023-06-10T02:09:50.523", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:49.453", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21661.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21661.json index 9e28fb19b10..46a8ecd6a25 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21661.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21661.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21661", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:12.507", - "lastModified": "2023-06-10T02:10:08.640", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:49.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21662.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21662.json index e576436a8cb..9f847d85c0b 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21662.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21662.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21662", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.780", - "lastModified": "2023-09-08T16:36:43.213", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:49.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21663.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21663.json index 6cc28698c32..e930d8cca3a 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21663.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21663.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21663", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.863", - "lastModified": "2023-09-08T18:01:43.490", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:50.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ @@ -79,9 +89,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" } ] }, @@ -90,9 +100,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" } ] } @@ -101,17 +111,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" - } - ] - }, { "operator": "OR", "negate": false, @@ -122,23 +121,23 @@ "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -149,23 +148,23 @@ "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -176,23 +175,23 @@ "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -203,23 +202,23 @@ "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcc5100_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "58C4A954-9822-4B21-9221-C21031AD4180" + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -230,23 +229,23 @@ "matchCriteriaId": "0B1614E0-A51C-47DA-BBE1-89BF538D396E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + "criteria": "cpe:2.3:o:qualcomm:qcc5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58C4A954-9822-4B21-9221-C21031AD4180" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -257,6 +256,17 @@ "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] } ] }, @@ -268,9 +278,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" } ] }, @@ -279,9 +289,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" } ] } @@ -403,9 +413,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" } ] }, @@ -414,9 +424,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" } ] } diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21664.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21664.json index 6ad8d9f8fbd..8198b8c6354 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21664.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21664.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21664", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:12.940", - "lastModified": "2023-09-08T18:06:54.917", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:50.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21665.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21665.json index fdf2a28a587..98006cbba36 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21665.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21665.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21665", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:10.433", - "lastModified": "2023-05-31T19:15:23.380", + "lastModified": "2024-04-12T17:16:50.717", "vulnStatus": "Modified", "descriptions": [ { @@ -64,6 +64,16 @@ "value": "CWE-704" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-704" + } + ] } ], "configurations": [ @@ -5610,9 +5620,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62B00662-139A-4E36-98FA-D4F7D101D4AB" } ] }, @@ -5621,9 +5631,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*", - "matchCriteriaId": "62B00662-139A-4E36-98FA-D4F7D101D4AB" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE" } ] } @@ -5632,17 +5642,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3660_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7B2669D0-81C0-4F3C-B9AF-1453815C68B1" - } - ] - }, { "operator": "OR", "negate": false, @@ -5653,23 +5652,23 @@ "matchCriteriaId": "34D7240B-DCB4-4BF4-94C7-13EBECA62D6C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + "criteria": "cpe:2.3:o:qualcomm:wcn3660_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B2669D0-81C0-4F3C-B9AF-1453815C68B1" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5680,23 +5679,23 @@ "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0F66A898-3C7A-4D44-86BD-89129F04E654" + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5707,23 +5706,23 @@ "matchCriteriaId": "B612B044-C7D1-4662-AB2A-5400E34A3CA7" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" + "criteria": "cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F66A898-3C7A-4D44-86BD-89129F04E654" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5734,23 +5733,23 @@ "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" + "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5761,23 +5760,23 @@ "matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5788,6 +5787,17 @@ "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] } ] }, @@ -5799,9 +5809,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" } ] }, @@ -5810,9 +5820,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" } ] } diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21666.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21666.json index 5547a4eac5a..bb9a3775fb5 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21666.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21666.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21666", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:10.510", - "lastModified": "2023-05-31T19:15:25.217", + "lastModified": "2024-04-12T17:16:51.127", "vulnStatus": "Modified", "descriptions": [ { @@ -64,6 +64,16 @@ "value": "CWE-401" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21667.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21667.json index 901a03f92ff..33e6d73c72c 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21667.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21667.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21667", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.020", - "lastModified": "2023-09-08T18:11:14.130", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:51.450", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21669.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21669.json index 6e052367db0..de21aeec508 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21669.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21669.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21669", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:12.590", - "lastModified": "2023-06-10T02:10:13.000", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:51.647", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21670.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21670.json index 67fe7246ffa..4d16f9ec015 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21670.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21670.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21670", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-06-06T08:15:12.663", - "lastModified": "2023-07-04T17:15:09.397", + "lastModified": "2024-04-12T17:16:51.843", "vulnStatus": "Modified", "descriptions": [ { @@ -64,6 +64,16 @@ "value": "CWE-863" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21671.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21671.json index e0e38e37bef..7766b55f0bd 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21671.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21671.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21671", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:08.253", - "lastModified": "2023-11-14T18:26:07.527", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:52.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21672.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21672.json index 7b7d545c37b..45c35ae1d80 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21672.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21672.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21672", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.570", - "lastModified": "2023-07-11T13:46:10.947", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:52.340", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21673.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21673.json index 61ed49c7fa9..51d25cb9980 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21673.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21673.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21673", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:16.413", - "lastModified": "2023-10-04T18:14:42.920", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:52.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ @@ -79,9 +89,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" } ] }, @@ -90,9 +100,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" } ] } @@ -101,17 +111,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" - } - ] - }, { "operator": "OR", "negate": false, @@ -122,23 +121,23 @@ "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -149,23 +148,23 @@ "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -176,23 +175,23 @@ "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -203,23 +202,23 @@ "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -230,23 +229,23 @@ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -257,23 +256,23 @@ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -284,23 +283,23 @@ "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -311,23 +310,23 @@ "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -338,23 +337,23 @@ "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -365,6 +364,17 @@ "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] } ] }, @@ -376,9 +386,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2" } ] }, @@ -387,9 +397,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" } ] } @@ -1267,9 +1277,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A" } ] }, @@ -1278,9 +1288,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" } ] } @@ -1289,17 +1299,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" - } - ] - }, { "operator": "OR", "negate": false, @@ -1310,23 +1309,23 @@ "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1337,23 +1336,23 @@ "matchCriteriaId": "F68F9B33-6BA5-46E1-A370-547CDA626985" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198" + "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1364,23 +1363,23 @@ "matchCriteriaId": "2D13E375-0562-4263-8452-53E117F14E83" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1391,23 +1390,23 @@ "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "407EE4D5-1F52-40D6-B85A-E49915D6EF2D" + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1418,6 +1417,17 @@ "matchCriteriaId": "5846C9DD-63E5-482D-BE01-3A1E89CC0EDE" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "407EE4D5-1F52-40D6-B85A-E49915D6EF2D" + } + ] } ] }, @@ -1429,9 +1439,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6B6A4AA9-E35B-4B25-9FD3-BFB907B822DB" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AC8538B-6663-4CF7-BD4A-9766C04CBAB5" } ] }, @@ -1440,9 +1450,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qdu1010:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5AC8538B-6663-4CF7-BD4A-9766C04CBAB5" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B6A4AA9-E35B-4B25-9FD3-BFB907B822DB" } ] } diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22382.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22382.json index b2722b14096..1dead0762cc 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22382.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22382.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22382", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:18.617", - "lastModified": "2023-10-04T18:14:01.107", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:52.737", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22383.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22383.json index 0659af85a95..4f80ac01eab 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22383.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22383.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22383", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:08.350", - "lastModified": "2023-12-11T13:18:16.687", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:09.180", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22384.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22384.json index af873549d36..6eba12a123c 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22384.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22384.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22384", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:19.860", - "lastModified": "2023-10-04T18:03:35.667", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:52.920", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22385.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22385.json index f921725ef90..53cce622809 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22385.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22385.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22385", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:21.053", - "lastModified": "2023-10-04T17:53:28.580", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:53.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ @@ -2266,9 +2276,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5AEA324C-69CE-4AAC-91D6-6FAAE1B3FA77" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7B5F5CD-CE26-4C93-9FED-F783947DBDA6" } ] }, @@ -2277,9 +2287,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A7B5F5CD-CE26-4C93-9FED-F783947DBDA6" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AEA324C-69CE-4AAC-91D6-6FAAE1B3FA77" } ] } @@ -2288,17 +2298,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2" - } - ] - }, { "operator": "OR", "negate": false, @@ -2309,23 +2308,23 @@ "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:robotics_rb3_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "85FE8AF5-3747-40D0-9DE3-5A77E05251C6" + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2336,23 +2335,23 @@ "matchCriteriaId": "FB7865B5-FAD2-4FC3-B708-0EE4AA4E4EB1" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95" + "criteria": "cpe:2.3:o:qualcomm:robotics_rb3_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85FE8AF5-3747-40D0-9DE3-5A77E05251C6" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2363,23 +2362,23 @@ "matchCriteriaId": "C819454D-D413-478A-B78D-CFF6994803A1" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd_455_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B3EF9964-D615-473E-A289-8A01D91D87AA" + "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2390,23 +2389,23 @@ "matchCriteriaId": "9C177163-B6E6-42D8-8969-C2F9832C6701" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A" + "criteria": "cpe:2.3:o:qualcomm:sd_455_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3EF9964-D615-473E-A289-8A01D91D87AA" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2417,23 +2416,23 @@ "matchCriteriaId": "589C1001-E9F6-41A6-BCC8-A94A3C97F2E6" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "52036768-810C-40C2-9213-8397A4073703" + "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2444,23 +2443,23 @@ "matchCriteriaId": "BE8AB22C-54EA-4D61-B6F9-7BC45820D29E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D9043720-6B49-4305-BB4F-C88CCB6D89E9" + "criteria": "cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52036768-810C-40C2-9213-8397A4073703" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2471,23 +2470,23 @@ "matchCriteriaId": "FC8F19D3-F322-4CDC-83C5-A9F7F1777DAD" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3991C516-4FBE-43D8-835F-413FE45BF73E" + "criteria": "cpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9043720-6B49-4305-BB4F-C88CCB6D89E9" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2498,23 +2497,23 @@ "matchCriteriaId": "D9CF5EBB-B25A-4A76-B522-951F108263CC" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C7BE7001-5539-4C5E-A064-6E62023803AE" + "criteria": "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3991C516-4FBE-43D8-835F-413FE45BF73E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2525,23 +2524,23 @@ "matchCriteriaId": "06661DAC-5D22-433E-B5EC-486931E265B4" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5B8DA94C-23A0-4C99-9F05-144B9B5224B3" + "criteria": "cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BE7001-5539-4C5E-A064-6E62023803AE" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2552,6 +2551,17 @@ "matchCriteriaId": "39E10E22-E7CC-41D6-80F3-030083F45645" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B8DA94C-23A0-4C99-9F05-144B9B5224B3" + } + ] } ] }, @@ -2563,9 +2573,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1497D052-884E-496B-BEF8-6904A25125ED" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "589F4888-28F6-4ECA-860E-8054C2A8C419" } ] }, @@ -2574,9 +2584,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*", - "matchCriteriaId": "589F4888-28F6-4ECA-860E-8054C2A8C419" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1497D052-884E-496B-BEF8-6904A25125ED" } ] } diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22386.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22386.json index b6a54865ecd..109c0314e63 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22386.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22386.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22386", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.627", - "lastModified": "2023-07-11T13:46:48.330", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:53.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22387.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22387.json index 06ad9d6a09a..eee2b094354 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22387.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22387.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22387", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.683", - "lastModified": "2023-07-11T13:47:01.917", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:53.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ @@ -156,9 +166,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" } ] }, @@ -167,9 +177,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" } ] } @@ -178,17 +188,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" - } - ] - }, { "operator": "OR", "negate": false, @@ -199,23 +198,23 @@ "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B032F871-3EC2-427D-A06F-681A58075925" + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -226,23 +225,23 @@ "matchCriteriaId": "73286FFB-C267-46B7-8FEF-C96534656AF9" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721" + "criteria": "cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B032F871-3EC2-427D-A06F-681A58075925" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -253,23 +252,23 @@ "matchCriteriaId": "B80D6366-4C0C-4C0D-9A38-769C66D62F0F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C" + "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -280,23 +279,23 @@ "matchCriteriaId": "1AA32CC0-DE30-4B15-8EC6-1FAF14C5C4E2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -307,23 +306,23 @@ "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -334,23 +333,23 @@ "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3" + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -361,23 +360,23 @@ "matchCriteriaId": "770F3924-BE27-4BDE-B922-680B3C9753EB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -388,23 +387,23 @@ "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -415,23 +414,23 @@ "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -442,6 +441,17 @@ "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] } ] }, @@ -453,9 +463,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" } ] }, @@ -464,9 +474,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" } ] } diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22388.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22388.json index a6028e0fc96..9abaa56ee40 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22388.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22388.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22388", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:08.427", - "lastModified": "2023-11-14T18:23:07.510", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:54.123", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22666.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22666.json index d8804125355..c57cff10605 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22666.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22666.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22666", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:13.880", - "lastModified": "2023-08-10T15:41:50.133", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:54.573", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22667.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22667.json index 4b586a1f0e7..ad1f6d02897 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22667.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22667.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22667", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.740", - "lastModified": "2023-07-11T13:47:11.277", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:54.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-190" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22668.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22668.json index ae58babb6a1..afc18bfbba0 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22668.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22668.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22668", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:08.520", - "lastModified": "2023-12-11T13:46:03.573", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:09.347", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24843.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24843.json index 11bb9d87233..b3e4eeeac62 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24843.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24843.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24843", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:22.160", - "lastModified": "2023-10-04T17:52:42.307", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:55.217", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24844.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24844.json index 4def6a00ce4..d2c24a3325c 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24844.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24844.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24844", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:22.293", - "lastModified": "2023-10-04T17:52:21.437", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:55.410", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24847.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24847.json index bae30bacf9e..8bf8589991f 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24847.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24847.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24847", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:22.620", - "lastModified": "2023-10-04T17:51:56.350", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:55.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-476" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ @@ -79,9 +89,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" } ] }, @@ -90,9 +100,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" } ] } diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24848.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24848.json index febf29b8f66..72adc02237a 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24848.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24848.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24848", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:22.953", - "lastModified": "2023-10-04T17:51:31.567", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:56.693", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ @@ -268,9 +278,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" } ] }, @@ -279,9 +289,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" } ] } @@ -290,17 +300,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721" - } - ] - }, { "operator": "OR", "negate": false, @@ -311,23 +310,23 @@ "matchCriteriaId": "B80D6366-4C0C-4C0D-9A38-769C66D62F0F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -338,23 +337,23 @@ "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -365,23 +364,23 @@ "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3" + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -392,23 +391,23 @@ "matchCriteriaId": "770F3924-BE27-4BDE-B922-680B3C9753EB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -419,23 +418,23 @@ "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -446,23 +445,23 @@ "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -473,23 +472,23 @@ "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -500,23 +499,23 @@ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -527,23 +526,23 @@ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm8207_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FE3BA789-3EC2-474D-BD5F-AD67BAE64413" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -554,6 +553,17 @@ "matchCriteriaId": "5954E2E1-3A62-4601-8D7F-21B7B2D02370" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm8207_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE3BA789-3EC2-474D-BD5F-AD67BAE64413" + } + ] } ] }, @@ -565,9 +575,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:mdm8215_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DF497A07-F1EA-4A4F-A02F-CE22B148ED5A" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm8215:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53F4B19E-78D9-4721-BF1E-C0330888EE75" } ] }, @@ -576,9 +586,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:mdm8215:-:*:*:*:*:*:*:*", - "matchCriteriaId": "53F4B19E-78D9-4721-BF1E-C0330888EE75" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm8215_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF497A07-F1EA-4A4F-A02F-CE22B148ED5A" } ] } @@ -4912,9 +4922,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sc8180xp-ac_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "61C77656-153F-4DA8-9C7C-BCAAFD25E0A7" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180xp-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DFDC9D5-81AB-4B4E-AB78-691B8A389C86" } ] }, @@ -4923,9 +4933,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sc8180xp-ac:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0DFDC9D5-81AB-4B4E-AB78-691B8A389C86" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180xp-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61C77656-153F-4DA8-9C7C-BCAAFD25E0A7" } ] } @@ -4934,17 +4944,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sc8180xp-af_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3B7DFFD6-92C7-4042-BD8F-D3E6FDB7958C" - } - ] - }, { "operator": "OR", "negate": false, @@ -4955,23 +4954,23 @@ "matchCriteriaId": "007B494C-4AAD-4E74-BD16-C62A643BC241" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sc8180x-ac_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EEC4BF9B-2B98-44FF-9B81-25C10AB71E24" + "criteria": "cpe:2.3:o:qualcomm:sc8180xp-af_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B7DFFD6-92C7-4042-BD8F-D3E6FDB7958C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4982,23 +4981,23 @@ "matchCriteriaId": "02C5409B-4D98-4F3D-9902-41A5394342C9" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sc8180x-af_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1B66319C-184B-4417-85D6-4F8AB51B578E" + "criteria": "cpe:2.3:o:qualcomm:sc8180x-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEC4BF9B-2B98-44FF-9B81-25C10AB71E24" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5009,23 +5008,23 @@ "matchCriteriaId": "F7C8DA78-9E96-4140-961F-B2BD80ACCE54" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sc8180xp-aa_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "53AE3110-9F78-45E8-BAD9-2C63ACD7489B" + "criteria": "cpe:2.3:o:qualcomm:sc8180x-af_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B66319C-184B-4417-85D6-4F8AB51B578E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5036,23 +5035,23 @@ "matchCriteriaId": "819D5879-EE22-4E6B-B401-D02F7FC68679" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sc8180xp-ab_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6EBD06A6-7156-4363-AECB-6CA872008B54" + "criteria": "cpe:2.3:o:qualcomm:sc8180xp-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53AE3110-9F78-45E8-BAD9-2C63ACD7489B" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5063,23 +5062,23 @@ "matchCriteriaId": "FFEBF216-405D-462B-9345-3146315F6744" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" + "criteria": "cpe:2.3:o:qualcomm:sc8180xp-ab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6EBD06A6-7156-4363-AECB-6CA872008B54" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5090,23 +5089,23 @@ "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5117,23 +5116,23 @@ "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_2100_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C19F8862-65F2-4A80-82DB-44B312C377A9" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5144,6 +5143,17 @@ "matchCriteriaId": "07A533FB-1A79-4D28-8C4C-C0E5D59E09B4" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_2100_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C19F8862-65F2-4A80-82DB-44B312C377A9" + } + ] } ] }, @@ -5155,9 +5165,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_2500_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2317B9C5-14FE-4B54-AA6C-3F41B2B15A04" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_2500_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2EDA8707-6BB7-4749-B4FF-3282FB0A6AFA" } ] }, @@ -5166,9 +5176,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_2500_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2EDA8707-6BB7-4749-B4FF-3282FB0A6AFA" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_2500_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2317B9C5-14FE-4B54-AA6C-3F41B2B15A04" } ] } @@ -6424,9 +6434,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" } ] }, @@ -6435,9 +6445,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" } ] } @@ -6451,9 +6461,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" } ] }, @@ -6462,9 +6472,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" } ] } diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24849.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24849.json index cebda09c97e..1d7389bda19 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24849.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24849.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24849", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:23.050", - "lastModified": "2023-10-04T17:51:17.830", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:57.317", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ @@ -1321,9 +1331,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB" } ] }, @@ -1332,9 +1342,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", - "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" } ] } @@ -1375,9 +1385,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" } ] }, @@ -1386,9 +1396,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" } ] } @@ -1397,17 +1407,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "95CFB656-804A-453C-A39B-1B08C0A16BB9" - } - ] - }, { "operator": "OR", "negate": false, @@ -1418,6 +1417,17 @@ "matchCriteriaId": "7F0C9ED5-27E3-48EC-9A05-862715EE2034" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95CFB656-804A-453C-A39B-1B08C0A16BB9" + } + ] } ] }, @@ -1429,9 +1439,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" } ] }, @@ -1440,9 +1450,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", - "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" } ] } @@ -3130,9 +3140,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_1200_wearable_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E89870DD-3B20-4B06-9A51-755E204ECCDB" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_1200_wearable_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "955F15D0-2F36-45E7-9828-96593DA7DA80" } ] }, @@ -3141,9 +3151,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_1200_wearable_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "955F15D0-2F36-45E7-9828-96593DA7DA80" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_1200_wearable_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E89870DD-3B20-4B06-9A51-755E204ECCDB" } ] } @@ -3152,17 +3162,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_208_processor_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0CC78837-E44B-4D03-A9B1-C3494D823207" - } - ] - }, { "operator": "OR", "negate": false, @@ -3173,23 +3172,23 @@ "matchCriteriaId": "DF94E560-681D-48E7-9429-9B4BDB89393B" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_210_processor_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2C8490C5-0F0C-4AC6-A80F-06EF08E8C39E" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_208_processor_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CC78837-E44B-4D03-A9B1-C3494D823207" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3200,23 +3199,23 @@ "matchCriteriaId": "680B7C89-F3C0-49DA-A73E-CCDCF0A71CF0" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_212_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "70E745D7-3E43-42B1-9CBE-CA53846D0660" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_210_processor_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C8490C5-0F0C-4AC6-A80F-06EF08E8C39E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3227,23 +3226,23 @@ "matchCriteriaId": "13DA9023-07FE-46B5-9F3B-D6A2C5AED241" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2CCBF666-CB4E-44E1-9676-6891EDC73578" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_212_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70E745D7-3E43-42B1-9CBE-CA53846D0660" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3254,23 +3253,23 @@ "matchCriteriaId": "C767AB6A-1A8C-406C-A600-96A816F44E2F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CCBF666-CB4E-44E1-9676-6891EDC73578" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3281,6 +3280,17 @@ "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB" + } + ] } ] }, @@ -3292,9 +3302,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_425_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "58E5A10C-4B4C-48F7-9973-999726108CAB" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_425_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E657C793-12DB-4FCB-91C9-11DB09CA6E12" } ] }, @@ -3303,9 +3313,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_425_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E657C793-12DB-4FCB-91C9-11DB09CA6E12" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_425_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58E5A10C-4B4C-48F7-9973-999726108CAB" } ] } @@ -3400,9 +3410,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "390D7CAF-6C0B-4438-AA7D-AEEE127F4D3C" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_460_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BB1FC5E-CF6F-4E54-B78D-C01AFD034903" } ] }, @@ -3411,9 +3421,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_460_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5BB1FC5E-CF6F-4E54-B78D-C01AFD034903" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "390D7CAF-6C0B-4438-AA7D-AEEE127F4D3C" } ] } @@ -3427,9 +3437,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CA3F11F3-C9F4-460D-BD77-1BFBCC1F0592" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25673A10-D99C-4F67-BDA7-9C2E4A70EF9C" } ] }, @@ -3438,9 +3448,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "25673A10-D99C-4F67-BDA7-9C2E4A70EF9C" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA3F11F3-C9F4-460D-BD77-1BFBCC1F0592" } ] } diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24850.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24850.json index 5c878324c84..8d05f216ed2 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24850.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24850.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24850", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:23.360", - "lastModified": "2023-10-04T17:51:03.337", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:57.893", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-129" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24851.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24851.json index 60e79b8db25..edbae510d3d 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24851.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24851.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24851", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.797", - "lastModified": "2023-07-11T13:47:21.847", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:58.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ @@ -1830,9 +1840,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*", + "matchCriteriaId": "163FE96E-DF5B-4B67-8EDE-44A5B9A8492D" } ] }, @@ -1841,9 +1851,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*", - "matchCriteriaId": "163FE96E-DF5B-4B67-8EDE-44A5B9A8492D" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F" } ] } @@ -1852,17 +1862,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" - } - ] - }, { "operator": "OR", "negate": false, @@ -1873,23 +1872,23 @@ "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1900,23 +1899,23 @@ "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "478B79F0-D257-41B2-965B-3E251A584D45" + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1927,23 +1926,23 @@ "matchCriteriaId": "8B6D2C9D-1BF9-4D78-90FB-B7633DD87E67" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "63965F19-033E-4755-B9CA-EF409EC339A3" + "criteria": "cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "478B79F0-D257-41B2-965B-3E251A584D45" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1954,23 +1953,23 @@ "matchCriteriaId": "CCA0E68F-6D5F-4C20-AABC-26CA6867D3D6" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "85740DB4-3B08-48A4-ACAF-7BBB2612009A" + "criteria": "cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63965F19-033E-4755-B9CA-EF409EC339A3" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1981,23 +1980,23 @@ "matchCriteriaId": "8A0BD404-5EBA-4988-91B6-ECE8FCF4F041" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn5054_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2D6190FE-17A6-48CE-AA34-5DCF01362E9F" + "criteria": "cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85740DB4-3B08-48A4-ACAF-7BBB2612009A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2008,23 +2007,23 @@ "matchCriteriaId": "09AB1C26-7ED2-431E-8EA4-8ACB16857A01" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "290BFC8A-0D76-4BCD-B059-2DAFD368A10C" + "criteria": "cpe:2.3:o:qualcomm:qcn5054_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D6190FE-17A6-48CE-AA34-5DCF01362E9F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2035,23 +2034,23 @@ "matchCriteriaId": "936A308A-92B9-468C-9BC6-8FD71C7C2315" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2A9F76FF-96D3-4BCE-918D-B3B0ADA3E8E0" + "criteria": "cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "290BFC8A-0D76-4BCD-B059-2DAFD368A10C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2062,6 +2061,17 @@ "matchCriteriaId": "2908A543-EFE4-477D-9CF3-76534B2E6CF6" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A9F76FF-96D3-4BCE-918D-B3B0ADA3E8E0" + } + ] } ] }, @@ -2073,9 +2083,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0EAE1EBF-AD14-4C07-99B5-2547A5196B20" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4829FF9-C0BA-4E40-A01A-3EF179462029" } ] }, @@ -2084,9 +2094,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D4829FF9-C0BA-4E40-A01A-3EF179462029" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EAE1EBF-AD14-4C07-99B5-2547A5196B20" } ] } @@ -2235,9 +2245,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A59FBBDC-0495-422C-B25A-FFDF94D33C34" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6132:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6E55C06-45EE-4144-8CBC-4D41DDE4D899" } ] }, @@ -2246,9 +2256,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcn6132:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F6E55C06-45EE-4144-8CBC-4D41DDE4D899" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A59FBBDC-0495-422C-B25A-FFDF94D33C34" } ] } @@ -2257,17 +2267,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5BCCFF8B-4857-439D-BD4A-EB35672F474B" - } - ] - }, { "operator": "OR", "negate": false, @@ -2278,23 +2277,23 @@ "matchCriteriaId": "86896D55-89F5-440B-9082-916E486B65D9" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9001_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E02C2FD8-3434-4407-99E3-EE1779C18117" + "criteria": "cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BCCFF8B-4857-439D-BD4A-EB35672F474B" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2305,23 +2304,23 @@ "matchCriteriaId": "AC3468C1-CF50-4ED2-BD91-D1D140653CFC" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9002_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6694BAC2-6E3B-4589-8BEA-6B5219267D19" + "criteria": "cpe:2.3:o:qualcomm:qcn9001_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E02C2FD8-3434-4407-99E3-EE1779C18117" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2332,23 +2331,23 @@ "matchCriteriaId": "EF54E749-D512-45DE-841D-6199623C7099" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9003_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6128C715-8085-47A8-9EE3-F8C67FC1236B" + "criteria": "cpe:2.3:o:qualcomm:qcn9002_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6694BAC2-6E3B-4589-8BEA-6B5219267D19" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2359,23 +2358,23 @@ "matchCriteriaId": "73B9F6F0-2F3A-4A4E-91A1-39EE598E22A5" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13" + "criteria": "cpe:2.3:o:qualcomm:qcn9003_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6128C715-8085-47A8-9EE3-F8C67FC1236B" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2386,23 +2385,23 @@ "matchCriteriaId": "02BA009F-24E1-4953-BA95-2A5BC1CDBDBB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2413,23 +2412,23 @@ "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "36A10EB2-E7A2-461F-836E-FC38B9428C98" + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2440,23 +2439,23 @@ "matchCriteriaId": "A457C1D6-A026-4B5F-9CB1-FA795785A515" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + "criteria": "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36A10EB2-E7A2-461F-836E-FC38B9428C98" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2467,23 +2466,23 @@ "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2C10CAAC-FD93-4116-9F0C-E983B3693FAF" + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2494,23 +2493,23 @@ "matchCriteriaId": "9FEC2402-BA39-49BB-A34C-FF32ED44A158" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "809FD84D-11C5-4EE3-B830-62CF5F6CB1BC" + "criteria": "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C10CAAC-FD93-4116-9F0C-E983B3693FAF" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2521,6 +2520,17 @@ "matchCriteriaId": "DFD77A52-D53C-424F-9E17-160B710469C3" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "809FD84D-11C5-4EE3-B830-62CF5F6CB1BC" + } + ] } ] }, @@ -2532,9 +2542,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9" } ] }, @@ -2543,9 +2553,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42" } ] } @@ -4044,9 +4054,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9749871B-A555-4FAA-82F8-E46B95AC0F25" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0318A41-2E92-4C83-BB9D-68BC68E574BC" } ] }, @@ -4055,9 +4065,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E0318A41-2E92-4C83-BB9D-68BC68E574BC" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9749871B-A555-4FAA-82F8-E46B95AC0F25" } ] } @@ -5043,9 +5053,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD" } ] }, @@ -5054,9 +5064,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" } ] } diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24852.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24852.json index 640432c1042..4a3598fbedc 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24852.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24852.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24852", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:08.613", - "lastModified": "2023-11-14T18:21:51.557", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:58.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24853.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24853.json index 43ed11c022c..07e7d473fc0 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24853.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24853.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24853", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:23.710", - "lastModified": "2023-10-04T19:56:41.367", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:59.013", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24854.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24854.json index 37d8ac63129..19bcaed11b1 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24854.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24854.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24854", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.850", - "lastModified": "2023-07-11T13:47:45.033", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:16:59.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24855.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24855.json index cffc79fb456..dff8125fb23 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24855.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24855.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24855", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:23.950", - "lastModified": "2023-10-04T19:56:08.360", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:00.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ @@ -79,9 +89,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" } ] }, @@ -90,9 +100,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" } ] } diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28537.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28537.json index c00b35f5975..0f3e3c0309d 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28537.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28537.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28537", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:14.287", - "lastModified": "2023-08-10T18:18:17.920", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:00.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28538.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28538.json index 3600a1207b0..340d41ffb3d 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28538.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28538.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28538", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.113", - "lastModified": "2023-09-11T13:02:29.710", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:00.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ @@ -79,9 +89,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" } ] }, @@ -90,9 +100,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" } ] } @@ -101,17 +111,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" - } - ] - }, { "operator": "OR", "negate": false, @@ -122,23 +121,23 @@ "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -149,23 +148,23 @@ "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -176,23 +175,23 @@ "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -203,23 +202,23 @@ "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -230,23 +229,23 @@ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -257,6 +256,17 @@ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] } ] }, @@ -268,9 +278,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324" } ] }, @@ -279,9 +289,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" } ] } diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28539.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28539.json index 10db876f087..69f96cb7dfe 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28539.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28539.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28539", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:24.117", - "lastModified": "2023-10-04T19:55:39.053", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:01.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28540.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28540.json index c4c6bb0e8c3..3daec18cb16 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28540.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28540.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28540", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:24.370", - "lastModified": "2023-10-04T17:50:30.540", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:01.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-287" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28541.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28541.json index 87b55ec2c41..ae00535e259 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28541.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28541.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28541", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.913", - "lastModified": "2023-07-11T13:48:01.567", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:01.593", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ @@ -507,9 +517,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:immersive_home_316_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C7FCC903-A4B0-4462-9D1D-9B7B767D4607" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_316:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1725FFF-665F-4569-996C-31A0BB094D4F" } ] }, @@ -518,9 +528,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:immersive_home_316:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E1725FFF-665F-4569-996C-31A0BB094D4F" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_316_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7FCC903-A4B0-4462-9D1D-9B7B767D4607" } ] } @@ -529,17 +539,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:immersive_home_318_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "87655E53-09B3-4BC0-8BB4-1E4F0FFAE15F" - } - ] - }, { "operator": "OR", "negate": false, @@ -550,23 +549,23 @@ "matchCriteriaId": "BA1B1C6F-9195-4B94-9AAB-7E3EA6275F62" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq4018_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1D65E62B-95CA-4229-A61B-F4FB70466B6E" + "criteria": "cpe:2.3:o:qualcomm:immersive_home_318_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87655E53-09B3-4BC0-8BB4-1E4F0FFAE15F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -577,23 +576,23 @@ "matchCriteriaId": "1339CEEF-34C9-426E-864B-6C7B68E72CAA" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "94CB547F-0078-47CD-B511-06DE96882D5A" + "criteria": "cpe:2.3:o:qualcomm:ipq4018_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D65E62B-95CA-4229-A61B-F4FB70466B6E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -604,6 +603,17 @@ "matchCriteriaId": "AA679375-BB14-4B24-8AD9-B2BFBACE2FDB" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94CB547F-0078-47CD-B511-06DE96882D5A" + } + ] } ] }, @@ -615,9 +625,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq4028_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3525CD2A-CE43-4B42-B8C2-9B19B2551214" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq4028:-:*:*:*:*:*:*:*", + "matchCriteriaId": "010DBDB1-F1A3-4805-BDD2-84CBFA0A0BE1" } ] }, @@ -626,9 +636,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ipq4028:-:*:*:*:*:*:*:*", - "matchCriteriaId": "010DBDB1-F1A3-4805-BDD2-84CBFA0A0BE1" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq4028_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3525CD2A-CE43-4B42-B8C2-9B19B2551214" } ] } @@ -4125,9 +4135,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02" } ] }, @@ -4136,9 +4146,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" } ] } @@ -4147,17 +4157,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752" - } - ] - }, { "operator": "OR", "negate": false, @@ -4168,23 +4167,23 @@ "matchCriteriaId": "72F6CE39-9299-4FC3-BC48-11F79034F2E4" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sdx20m_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4079EC4E-ACCF-4BC4-BC3F-D7951C4B6496" + "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4195,23 +4194,23 @@ "matchCriteriaId": "5765D9F4-4090-4470-A90A-7E72A50881AF" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" + "criteria": "cpe:2.3:o:qualcomm:sdx20m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4079EC4E-ACCF-4BC4-BC3F-D7951C4B6496" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4222,23 +4221,23 @@ "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sdx65m_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "08C59BD9-8629-467F-9C1C-F2232C821DDB" + "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4249,23 +4248,23 @@ "matchCriteriaId": "7E7510FC-E89C-4EE4-84AE-8002E48937D2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BF7A6EE4-D951-480F-8F68-D49983C911D6" + "criteria": "cpe:2.3:o:qualcomm:sdx65m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08C59BD9-8629-467F-9C1C-F2232C821DDB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4276,6 +4275,17 @@ "matchCriteriaId": "6FD155BC-1157-4DEA-940A-FB8BD117D4C6" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF7A6EE4-D951-480F-8F68-D49983C911D6" + } + ] } ] }, @@ -4287,9 +4297,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4D0C530E-53E7-482B-8522-C632E98E756B" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_429:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2942BDD8-5542-430C-B566-245758DC2329" } ] }, @@ -4298,9 +4308,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_429:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2942BDD8-5542-430C-B566-245758DC2329" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D0C530E-53E7-482B-8522-C632E98E756B" } ] } diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28542.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28542.json index 0ed056bfaa3..6608b02fa82 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28542.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28542.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28542", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-07-04T05:15:10.970", - "lastModified": "2023-07-11T11:43:07.723", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:01.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28543.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28543.json index 22dddcd71d1..665fdf4131f 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28543.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28543.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28543", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.197", - "lastModified": "2023-09-08T18:16:21.503", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:02.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ @@ -79,9 +89,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C" } ] }, @@ -90,9 +100,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" } ] } @@ -101,17 +111,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB222869-9CDB-43B1-8947-954C8C8520B8" - } - ] - }, { "operator": "OR", "negate": false, @@ -122,23 +121,23 @@ "matchCriteriaId": "306DAB18-F737-47DE-A47D-C39F1B25D515" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B05FD66D-13A6-40E9-A64B-E428378F237E" + "criteria": "cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB222869-9CDB-43B1-8947-954C8C8520B8" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -149,6 +148,17 @@ "matchCriteriaId": "D0D665C1-3EBA-42F2-BF56-55E6C365F7DF" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B05FD66D-13A6-40E9-A64B-E428378F237E" + } + ] } ] }, @@ -160,9 +170,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "36F5A18B-8C9E-4A38-B994-E3E2696BB83D" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B703667D-DE09-40AF-BA44-E0E56252A790" } ] }, @@ -171,9 +181,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B703667D-DE09-40AF-BA44-E0E56252A790" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36F5A18B-8C9E-4A38-B994-E3E2696BB83D" } ] } diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28544.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28544.json index 21dfd620bbe..419350ddbcd 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28544.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28544.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28544", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.280", - "lastModified": "2023-09-11T17:08:00.573", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:02.397", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ @@ -349,9 +359,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:immersive_home_216_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "68309F58-91D9-407E-9578-17EAF6836E07" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_216_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0D491A9-6A1F-4B62-9A30-5A9F592BD5B5" } ] }, @@ -360,9 +370,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:immersive_home_216_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A0D491A9-6A1F-4B62-9A30-5A9F592BD5B5" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_216_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68309F58-91D9-407E-9578-17EAF6836E07" } ] } @@ -371,17 +381,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:immersive_home_316_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AA6CA3E5-7A0F-4705-985E-0C25DE609494" - } - ] - }, { "operator": "OR", "negate": false, @@ -392,23 +391,23 @@ "matchCriteriaId": "8DC770BF-4B23-4F43-A0B9-E5FE41536F5E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:immersive_home_318_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "84B4531C-9D90-4A9B-8724-1428372319C8" + "criteria": "cpe:2.3:o:qualcomm:immersive_home_316_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA6CA3E5-7A0F-4705-985E-0C25DE609494" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -419,23 +418,23 @@ "matchCriteriaId": "497EC79B-0879-4FA2-A5B7-63EA54FC20A5" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq4018_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1D65E62B-95CA-4229-A61B-F4FB70466B6E" + "criteria": "cpe:2.3:o:qualcomm:immersive_home_318_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84B4531C-9D90-4A9B-8724-1428372319C8" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -446,6 +445,17 @@ "matchCriteriaId": "1339CEEF-34C9-426E-864B-6C7B68E72CAA" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq4018_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D65E62B-95CA-4229-A61B-F4FB70466B6E" + } + ] } ] }, @@ -457,9 +467,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "94CB547F-0078-47CD-B511-06DE96882D5A" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA679375-BB14-4B24-8AD9-B2BFBACE2FDB" } ] }, @@ -468,9 +478,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AA679375-BB14-4B24-8AD9-B2BFBACE2FDB" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94CB547F-0078-47CD-B511-06DE96882D5A" } ] } @@ -4480,9 +4490,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1C9940B4-672B-4D82-B904-80A3FC1DD4C2" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11ADEB65-9803-4036-AAB4-B85E430B626D" } ] }, @@ -4491,9 +4501,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "11ADEB65-9803-4036-AAB4-B85E430B626D" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C9940B4-672B-4D82-B904-80A3FC1DD4C2" } ] } @@ -4502,17 +4512,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DD14F17B-FDC3-4B1B-9901-E40B783E77C6" - } - ] - }, { "operator": "OR", "negate": false, @@ -4523,23 +4522,23 @@ "matchCriteriaId": "B8FD2424-599C-4137-9BB0-378F34B7AB3C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F6037264-BF88-4BCA-9F5F-B5D30587D9A8" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD14F17B-FDC3-4B1B-9901-E40B783E77C6" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4550,23 +4549,23 @@ "matchCriteriaId": "BABB84B3-C5BC-4AE9-AB6E-BA4BAF9FBECB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_compute_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "65B3644E-74B5-41BB-BA43-F3E588D152CE" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6037264-BF88-4BCA-9F5F-B5D30587D9A8" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4577,23 +4576,23 @@ "matchCriteriaId": "75F10C87-25C4-40A5-9B7E-904C2258CB3C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_gen_2_compute_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EC68355A-3202-4317-9767-26AFDD321789" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65B3644E-74B5-41BB-BA43-F3E588D152CE" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4604,23 +4603,23 @@ "matchCriteriaId": "AF331899-4AA1-4D55-B494-4FA47BB97AE5" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "81FC1C9D-D494-4426-93FF-A774D68554D7" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_gen_2_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC68355A-3202-4317-9767-26AFDD321789" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4631,6 +4630,17 @@ "matchCriteriaId": "5B4837E0-EFF7-4546-918C-03551E03F6BD" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81FC1C9D-D494-4426-93FF-A774D68554D7" + } + ] } ] }, @@ -4642,9 +4652,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D56B0CD3-138D-4197-84D5-2887C8FA40D2" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_845_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E289B26-AF53-442A-9740-2F44D1F59DA5" } ] }, @@ -4653,9 +4663,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_845_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4E289B26-AF53-442A-9740-2F44D1F59DA5" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D56B0CD3-138D-4197-84D5-2887C8FA40D2" } ] } diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28545.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28545.json index b81b0f03a3b..bb61e26c36d 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28545.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28545.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28545", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:08.803", - "lastModified": "2023-11-14T18:21:09.870", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:02.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ @@ -160,9 +170,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" } ] }, @@ -171,9 +181,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" } ] } @@ -187,9 +197,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" } ] }, @@ -198,9 +208,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" } ] } @@ -1510,9 +1520,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F466A5BD-1912-4811-9A93-81555F101D46" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F92914E-16F6-4A25-9FEF-FB7CB3377132" } ] }, @@ -1521,9 +1531,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0F92914E-16F6-4A25-9FEF-FB7CB3377132" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F466A5BD-1912-4811-9A93-81555F101D46" } ] } @@ -1532,17 +1542,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13" - } - ] - }, { "operator": "OR", "negate": false, @@ -1553,23 +1552,23 @@ "matchCriteriaId": "02BA009F-24E1-4953-BA95-2A5BC1CDBDBB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1580,23 +1579,23 @@ "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1607,23 +1606,23 @@ "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851" + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1634,23 +1633,23 @@ "matchCriteriaId": "76E03AE9-2485-449B-BCFD-3E452BB01FC6" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153" + "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1661,6 +1660,17 @@ "matchCriteriaId": "FFCB9F22-57F2-4327-95B9-B2342A02E45E" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153" + } + ] } ] }, @@ -1672,9 +1682,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A" } ] }, @@ -1683,9 +1693,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" } ] } @@ -5263,9 +5273,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F" } ] }, @@ -5274,9 +5284,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*", - "matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" } ] } @@ -5285,17 +5295,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" - } - ] - }, { "operator": "OR", "negate": false, @@ -5306,6 +5305,17 @@ "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] } ] }, @@ -5317,9 +5327,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" } ] }, @@ -5328,9 +5338,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" } ] } diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28546.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28546.json index 2ce2f508701..d2454c67582 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28546.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28546.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28546", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:08.690", - "lastModified": "2023-12-11T13:53:48.177", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:09.513", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28548.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28548.json index cce2454d3cb..395232584f0 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28548.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28548.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28548", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.360", - "lastModified": "2023-09-11T17:05:04.900", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:03.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-129" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28549.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28549.json index f2ce9958ee7..bd80525f096 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28549.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28549.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28549", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.437", - "lastModified": "2023-09-11T16:58:23.583", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:03.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-119" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28550.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28550.json index 96e11c8bcf4..e4fbd4983e5 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28550.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28550.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28550", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:08.870", - "lastModified": "2023-12-11T14:21:12.367", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:10.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28551.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28551.json index 9cf801132f6..3b62296938f 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28551.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28551.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28551", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:09.053", - "lastModified": "2023-12-11T20:15:54.523", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:10.583", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28553.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28553.json index 761c708d53a..a2fd61818be 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28553.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28553.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28553", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:08.987", - "lastModified": "2023-11-14T18:20:26.560", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:03.977", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ @@ -79,9 +89,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" } ] }, @@ -90,9 +100,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" } ] } @@ -101,17 +111,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B032F871-3EC2-427D-A06F-681A58075925" - } - ] - }, { "operator": "OR", "negate": false, @@ -122,6 +121,17 @@ "matchCriteriaId": "73286FFB-C267-46B7-8FEF-C96534656AF9" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B032F871-3EC2-427D-A06F-681A58075925" + } + ] } ] }, @@ -133,9 +143,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AA32CC0-DE30-4B15-8EC6-1FAF14C5C4E2" } ] }, @@ -144,9 +154,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1AA32CC0-DE30-4B15-8EC6-1FAF14C5C4E2" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C" } ] } @@ -1456,9 +1466,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" } ] }, @@ -1467,9 +1477,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" } ] } @@ -1478,17 +1488,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530" - } - ] - }, { "operator": "OR", "negate": false, @@ -1499,23 +1498,23 @@ "matchCriteriaId": "C9EB615F-FD4C-450B-AB25-E936FD9816C4" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1526,23 +1525,23 @@ "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1553,6 +1552,17 @@ "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] } ] }, @@ -1564,9 +1574,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca7500_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9D4F8296-D8D0-42C6-AAD2-24DA0DB403D4" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca7500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14EC7373-E5F3-4D2B-B727-CAEE772B74BB" } ] }, @@ -1575,9 +1585,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca7500:-:*:*:*:*:*:*:*", - "matchCriteriaId": "14EC7373-E5F3-4D2B-B727-CAEE772B74BB" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca7500_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D4F8296-D8D0-42C6-AAD2-24DA0DB403D4" } ] } @@ -2104,9 +2114,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "90EF18E5-6D32-4A75-95B8-DF41A5373DEB" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D3E2A00-5BFA-48A0-8DF1-DC33B2CA3DD7" } ] }, @@ -2115,9 +2125,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6D3E2A00-5BFA-48A0-8DF1-DC33B2CA3DD7" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "90EF18E5-6D32-4A75-95B8-DF41A5373DEB" } ] } @@ -2131,9 +2141,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F" } ] }, @@ -2142,9 +2152,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", - "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" } ] } @@ -3913,9 +3923,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" } ] }, @@ -3924,9 +3934,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" } ] } @@ -3940,9 +3950,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" } ] }, @@ -3951,9 +3961,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" } ] } diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28554.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28554.json index 313be76a20f..99fb3fa7010 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28554.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28554.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28554", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:09.177", - "lastModified": "2023-11-14T18:20:07.357", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:04.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28555.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28555.json index ae41d891d94..668f0990f07 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28555.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28555.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28555", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:14.373", - "lastModified": "2023-08-10T18:17:57.923", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:04.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28556.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28556.json index ec18b2a1969..ef4285cf8ca 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28556.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28556.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28556", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:09.343", - "lastModified": "2023-11-14T18:19:44.400", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:04.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] } ], "configurations": [ @@ -2509,9 +2519,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2F357160-9EF0-4150-893B-746289C071AD" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc5_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3429F7D-C5C7-488E-8E32-518838C51621" } ] }, @@ -2520,9 +2530,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc5_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D3429F7D-C5C7-488E-8E32-518838C51621" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F357160-9EF0-4150-893B-746289C071AD" } ] } @@ -2531,17 +2541,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FCA73E75-F339-49BA-B1F6-619E4630DE92" - } - ] - }, { "operator": "OR", "negate": false, @@ -2552,23 +2551,23 @@ "matchCriteriaId": "5DA6E940-1059-4EA2-8225-0F754FE9F50F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931" + "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA73E75-F339-49BA-B1F6-619E4630DE92" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2579,23 +2578,23 @@ "matchCriteriaId": "A558A868-1B67-48D2-8A94-FDEA7126FAE7" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD" + "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2606,23 +2605,23 @@ "matchCriteriaId": "7964A762-467B-47D7-865F-30D48A0AE47C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2633,6 +2632,17 @@ "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] } ] }, @@ -2644,9 +2654,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" } ] }, @@ -2655,9 +2665,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" } ] } @@ -3967,9 +3977,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A9A2DA11-5E4E-4E36-923C-A2D3CC2F2751" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE7DFAD4-1D21-4A3A-9E8C-10F00AD7C403" } ] }, @@ -3978,9 +3988,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BE7DFAD4-1D21-4A3A-9E8C-10F00AD7C403" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9A2DA11-5E4E-4E36-923C-A2D3CC2F2751" } ] } @@ -3989,17 +3999,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_710_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAB1AE-53FE-4641-A2BB-4E1449A76E8C" - } - ] - }, { "operator": "OR", "negate": false, @@ -4010,6 +4009,17 @@ "matchCriteriaId": "3E92D896-80E5-47C6-A752-F19F1CB8005D" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_710_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEAB1AE-53FE-4641-A2BB-4E1449A76E8C" + } + ] } ] }, @@ -4021,9 +4031,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E6B6B409-33F8-49CA-9A09-3AA97DCBCE54" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_720g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F34AF35-8A0B-4B90-8AE6-EC961B7FEC4B" } ] }, @@ -4032,9 +4042,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_720g_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1F34AF35-8A0B-4B90-8AE6-EC961B7FEC4B" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6B6B409-33F8-49CA-9A09-3AA97DCBCE54" } ] } @@ -4912,9 +4922,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB6053F0-5E34-458A-B084-078E4D4F4021" } ] }, @@ -4923,9 +4933,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FB6053F0-5E34-458A-B084-078E4D4F4021" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1" } ] } @@ -4934,17 +4944,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" - } - ] - }, { "operator": "OR", "negate": false, @@ -4955,23 +4954,23 @@ "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4982,23 +4981,23 @@ "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_1300_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5A402233-B76F-41D5-B7C2-325C8FC4D560" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5009,23 +5008,23 @@ "matchCriteriaId": "C8643194-C881-408A-AAA1-78572075120A" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_x24_lte_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5CAB1351-A614-4E73-B58E-7D624695C657" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_1300_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A402233-B76F-41D5-B7C2-325C8FC4D560" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5036,23 +5035,23 @@ "matchCriteriaId": "4494AAD7-D132-41DB-9756-CAD1F3F7AE7E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "69D1567F-D669-4415-9A08-110221EFA6BA" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x24_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CAB1351-A614-4E73-B58E-7D624695C657" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5063,23 +5062,23 @@ "matchCriteriaId": "EF808C56-AD46-4351-9A46-6A2B6AAAB5BB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69D1567F-D669-4415-9A08-110221EFA6BA" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5090,23 +5089,23 @@ "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5117,23 +5116,23 @@ "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5144,23 +5143,23 @@ "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A1E1B7FD-39CD-42AB-A113-2AFB25B5F85B" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5171,23 +5170,23 @@ "matchCriteriaId": "C93EECE3-7A8A-4B58-A674-134040CE43FE" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1E1B7FD-39CD-42AB-A113-2AFB25B5F85B" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5198,6 +5197,17 @@ "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C" + } + ] } ] }, @@ -5209,9 +5219,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BF9740EB-F82E-42EA-993E-A393B05CC6BB" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "022A5532-03F7-4FB8-BA0D-4221178C9486" } ] }, @@ -5220,9 +5230,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "022A5532-03F7-4FB8-BA0D-4221178C9486" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF9740EB-F82E-42EA-993E-A393B05CC6BB" } ] } @@ -5992,9 +6002,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DF49BC31-A332-4B9A-A826-F63116D7029F" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DD3C245-D5F8-4145-8CDF-F635D2C8F088" } ] }, @@ -6003,9 +6013,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6DD3C245-D5F8-4145-8CDF-F635D2C8F088" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF49BC31-A332-4B9A-A826-F63116D7029F" } ] } @@ -6014,17 +6024,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" - } - ] - }, { "operator": "OR", "negate": false, @@ -6035,6 +6034,17 @@ "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + } + ] } ] }, @@ -6046,9 +6056,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" } ] }, @@ -6057,9 +6067,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" } ] } diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28557.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28557.json index ab04a864d41..b2dc2856b3e 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28557.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28557.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28557", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.517", - "lastModified": "2023-09-11T16:57:21.930", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:05.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-129" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ @@ -1456,9 +1466,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca2064_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E73670B4-1055-4C65-AD34-EB978ABB19A6" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca2064:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C774D66F-60C9-46B8-BE1D-B8D61EE5E844" } ] }, @@ -1467,9 +1477,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca2064:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C774D66F-60C9-46B8-BE1D-B8D61EE5E844" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca2064_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E73670B4-1055-4C65-AD34-EB978ABB19A6" } ] } @@ -1478,17 +1488,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca2065_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8C68AE99-4C8C-43AE-94AA-82632FD2BBE4" - } - ] - }, { "operator": "OR", "negate": false, @@ -1499,23 +1498,23 @@ "matchCriteriaId": "E255A21F-EC50-436F-81D9-8B2AC56D9BCE" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca2066_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6366F2ED-C6B7-4579-B304-C5B6DF951EB4" + "criteria": "cpe:2.3:o:qualcomm:qca2065_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C68AE99-4C8C-43AE-94AA-82632FD2BBE4" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1526,23 +1525,23 @@ "matchCriteriaId": "09B688AF-E1A4-496C-924C-D6B725CBBE26" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C359D1E7-6E0A-41B5-ABE5-B55598960700" + "criteria": "cpe:2.3:o:qualcomm:qca2066_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6366F2ED-C6B7-4579-B304-C5B6DF951EB4" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1553,6 +1552,17 @@ "matchCriteriaId": "B4DC3CE7-0C4A-458B-A42E-8F80C062DD5F" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C359D1E7-6E0A-41B5-ABE5-B55598960700" + } + ] } ] }, @@ -1564,9 +1574,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B0F8ED6-EAE7-44EA-A8C6-F5AD408261F0" } ] }, @@ -1575,9 +1585,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5B0F8ED6-EAE7-44EA-A8C6-F5AD408261F0" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2" } ] } @@ -2941,9 +2951,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "63965F19-033E-4755-B9CA-EF409EC339A3" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCA0E68F-6D5F-4C20-AABC-26CA6867D3D6" } ] }, @@ -2952,9 +2962,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CCA0E68F-6D5F-4C20-AABC-26CA6867D3D6" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63965F19-033E-4755-B9CA-EF409EC339A3" } ] } @@ -2963,17 +2973,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "85740DB4-3B08-48A4-ACAF-7BBB2612009A" - } - ] - }, { "operator": "OR", "negate": false, @@ -2984,23 +2983,23 @@ "matchCriteriaId": "8A0BD404-5EBA-4988-91B6-ECE8FCF4F041" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn5054_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2D6190FE-17A6-48CE-AA34-5DCF01362E9F" + "criteria": "cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85740DB4-3B08-48A4-ACAF-7BBB2612009A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3011,23 +3010,23 @@ "matchCriteriaId": "09AB1C26-7ED2-431E-8EA4-8ACB16857A01" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "290BFC8A-0D76-4BCD-B059-2DAFD368A10C" + "criteria": "cpe:2.3:o:qualcomm:qcn5054_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D6190FE-17A6-48CE-AA34-5DCF01362E9F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3038,23 +3037,23 @@ "matchCriteriaId": "936A308A-92B9-468C-9BC6-8FD71C7C2315" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2A9F76FF-96D3-4BCE-918D-B3B0ADA3E8E0" + "criteria": "cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "290BFC8A-0D76-4BCD-B059-2DAFD368A10C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3065,23 +3064,23 @@ "matchCriteriaId": "2908A543-EFE4-477D-9CF3-76534B2E6CF6" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0EAE1EBF-AD14-4C07-99B5-2547A5196B20" + "criteria": "cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A9F76FF-96D3-4BCE-918D-B3B0ADA3E8E0" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3092,6 +3091,17 @@ "matchCriteriaId": "D4829FF9-C0BA-4E40-A01A-3EF179462029" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EAE1EBF-AD14-4C07-99B5-2547A5196B20" + } + ] } ] }, @@ -3103,9 +3113,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0ED3ED74-C2D0-4A84-A2F8-392818E5CD20" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F1CA219-959D-481A-8622-69F1825832FB" } ] }, @@ -3114,9 +3124,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4F1CA219-959D-481A-8622-69F1825832FB" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0ED3ED74-C2D0-4A84-A2F8-392818E5CD20" } ] } @@ -5182,9 +5192,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform__firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "85850040-DFF4-41D0-A949-CF8B139FEEF8" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform_:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4200EEB-629B-45C0-95AB-EB764BD76422" } ] }, @@ -5193,9 +5203,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform_:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F4200EEB-629B-45C0-95AB-EB764BD76422" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform__firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85850040-DFF4-41D0-A949-CF8B139FEEF8" } ] } @@ -5204,17 +5214,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_630_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "531A9325-790A-4D7E-BFF2-EB1808C719D7" - } - ] - }, { "operator": "OR", "negate": false, @@ -5225,6 +5224,17 @@ "matchCriteriaId": "E1AACB4E-70A7-43ED-953D-911D2450C946" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_630_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "531A9325-790A-4D7E-BFF2-EB1808C719D7" + } + ] } ] }, @@ -5236,9 +5246,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_636_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2C558A35-E8E3-43CD-BAC5-C665875D3E60" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_636_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F23BF59-9FB7-49D6-846D-52263747E69F" } ] }, @@ -5247,9 +5257,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_636_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5F23BF59-9FB7-49D6-846D-52263747E69F" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_636_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C558A35-E8E3-43CD-BAC5-C665875D3E60" } ] } @@ -6127,9 +6137,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809" } ] }, @@ -6138,9 +6148,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624" } ] } @@ -6154,9 +6164,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+860_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "83BB4E6C-2D33-49A1-909F-B7BD7B0CFCDE" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+860_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F26F891B-8D25-47F3-BA02-FBB8A7160598" } ] }, @@ -6165,9 +6175,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+860_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F26F891B-8D25-47F3-BA02-FBB8A7160598" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+860_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83BB4E6C-2D33-49A1-909F-B7BD7B0CFCDE" } ] } @@ -6451,9 +6461,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C7ACDB5B-A32C-43A1-9086-D081E9FFF9AA" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "583E50CC-2017-4092-A21E-7AAC53F53A25" } ] }, @@ -6462,9 +6472,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "583E50CC-2017-4092-A21E-7AAC53F53A25" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7ACDB5B-A32C-43A1-9086-D081E9FFF9AA" } ] } @@ -6478,9 +6488,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C7ACDB5B-A32C-43A1-9086-D081E9FFF9AA" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "583E50CC-2017-4092-A21E-7AAC53F53A25" } ] }, @@ -6489,9 +6499,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "583E50CC-2017-4092-A21E-7AAC53F53A25" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7ACDB5B-A32C-43A1-9086-D081E9FFF9AA" } ] } @@ -6500,17 +6510,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_3_compute_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7C155F86-467F-4B57-950E-12FAAB570B01" - } - ] - }, { "operator": "OR", "negate": false, @@ -6521,23 +6520,23 @@ "matchCriteriaId": "71E06B94-9463-49A6-B816-E8A82BEA8545" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_3_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C155F86-467F-4B57-950E-12FAAB570B01" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6548,23 +6547,23 @@ "matchCriteriaId": "FB6053F0-5E34-458A-B084-078E4D4F4021" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6575,23 +6574,23 @@ "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6602,6 +6601,17 @@ "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" + } + ] } ] }, @@ -6613,9 +6623,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "69D1567F-D669-4415-9A08-110221EFA6BA" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x50_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF808C56-AD46-4351-9A46-6A2B6AAAB5BB" } ] }, @@ -6624,9 +6634,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_x50_5g_modem-rf_system:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EF808C56-AD46-4351-9A46-6A2B6AAAB5BB" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69D1567F-D669-4415-9A08-110221EFA6BA" } ] } diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28558.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28558.json index d1ef0d02552..5fbd3ac8c04 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28558.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28558.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28558", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.603", - "lastModified": "2023-09-09T00:05:38.137", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:05.803", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ @@ -79,9 +89,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" } ] }, @@ -90,9 +100,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" } ] } @@ -101,17 +111,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" - } - ] - }, { "operator": "OR", "negate": false, @@ -122,6 +121,17 @@ "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + } + ] } ] }, @@ -133,9 +143,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" } ] }, @@ -144,9 +154,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" } ] } @@ -457,9 +467,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq4018_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1D65E62B-95CA-4229-A61B-F4FB70466B6E" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq4018:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1339CEEF-34C9-426E-864B-6C7B68E72CAA" } ] }, @@ -468,9 +478,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ipq4018:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1339CEEF-34C9-426E-864B-6C7B68E72CAA" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq4018_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D65E62B-95CA-4229-A61B-F4FB70466B6E" } ] } @@ -479,17 +489,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq4028_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3525CD2A-CE43-4B42-B8C2-9B19B2551214" - } - ] - }, { "operator": "OR", "negate": false, @@ -500,23 +499,23 @@ "matchCriteriaId": "010DBDB1-F1A3-4805-BDD2-84CBFA0A0BE1" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq4029_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3D21F293-B9C7-46CB-8D83-BEE27E899BC3" + "criteria": "cpe:2.3:o:qualcomm:ipq4028_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3525CD2A-CE43-4B42-B8C2-9B19B2551214" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -527,23 +526,23 @@ "matchCriteriaId": "C4BA4D00-D7B2-4152-BD82-E6F572655AF3" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7A1CC1C1-F2CA-4C43-B9E9-1288C3496C7B" + "criteria": "cpe:2.3:o:qualcomm:ipq4029_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D21F293-B9C7-46CB-8D83-BEE27E899BC3" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -554,23 +553,23 @@ "matchCriteriaId": "AC82552A-9E7C-4A13-B7A5-43CEA218675C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq8069_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C818E621-4286-485B-96E3-AB485F16BD8D" + "criteria": "cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A1CC1C1-F2CA-4C43-B9E9-1288C3496C7B" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -581,23 +580,23 @@ "matchCriteriaId": "87CFC07B-1F10-4AC8-85D8-5BE76FE35FB3" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2914BF98-E69C-4C8D-8B10-759642ADD7B4" + "criteria": "cpe:2.3:o:qualcomm:ipq8069_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C818E621-4286-485B-96E3-AB485F16BD8D" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -608,23 +607,23 @@ "matchCriteriaId": "2118C404-402F-463C-8160-3CC3B703DF30" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + "criteria": "cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2914BF98-E69C-4C8D-8B10-759642ADD7B4" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -635,23 +634,23 @@ "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca1062_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7B3F80BD-90EA-4207-BCB2-5E5CE80B599A" + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -662,6 +661,17 @@ "matchCriteriaId": "AEB9196D-4EE0-4978-8A80-C21B5DC0CF21" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca1062_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B3F80BD-90EA-4207-BCB2-5E5CE80B599A" + } + ] } ] }, @@ -673,9 +683,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca1064_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CBC2C38C-5D5F-49CB-8DF5-35974D13B40B" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca1064:-:*:*:*:*:*:*:*", + "matchCriteriaId": "365FE873-2311-44B8-B699-4B2F3459B0B2" } ] }, @@ -684,9 +694,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca1064:-:*:*:*:*:*:*:*", - "matchCriteriaId": "365FE873-2311-44B8-B699-4B2F3459B0B2" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca1064_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBC2C38C-5D5F-49CB-8DF5-35974D13B40B" } ] } @@ -1456,9 +1466,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" } ] }, @@ -1467,9 +1477,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", - "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" } ] } @@ -3292,9 +3302,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "37DF4D73-3ACC-41B3-8CA4-20DAECE6BFB7" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_662_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE08D23A-2D0D-4472-8847-27B955F55165" } ] }, @@ -3303,9 +3313,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_662_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FE08D23A-2D0D-4472-8847-27B955F55165" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37DF4D73-3ACC-41B3-8CA4-20DAECE6BFB7" } ] } @@ -3778,9 +3788,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F6037264-BF88-4BCA-9F5F-B5D30587D9A8" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BABB84B3-C5BC-4AE9-AB6E-BA4BAF9FBECB" } ] }, @@ -3789,9 +3799,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BABB84B3-C5BC-4AE9-AB6E-BA4BAF9FBECB" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6037264-BF88-4BCA-9F5F-B5D30587D9A8" } ] } @@ -3800,17 +3810,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A4C68227-8928-41C4-A6B8-CD142C018AB6" - } - ] - }, { "operator": "OR", "negate": false, @@ -3821,23 +3820,23 @@ "matchCriteriaId": "38E60ED4-9FB7-481E-915B-B7576566E0BC" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_compute_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "65B3644E-74B5-41BB-BA43-F3E588D152CE" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4C68227-8928-41C4-A6B8-CD142C018AB6" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3848,23 +3847,23 @@ "matchCriteriaId": "75F10C87-25C4-40A5-9B7E-904C2258CB3C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_gen_2_compute_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EC68355A-3202-4317-9767-26AFDD321789" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65B3644E-74B5-41BB-BA43-F3E588D152CE" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3875,23 +3874,23 @@ "matchCriteriaId": "AF331899-4AA1-4D55-B494-4FA47BB97AE5" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AAF6E29D-7041-43D8-A09B-DEF37B0500C5" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_gen_2_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC68355A-3202-4317-9767-26AFDD321789" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3902,23 +3901,23 @@ "matchCriteriaId": "3E53D47E-C94F-41BC-94ED-86002A961ACE" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "81FC1C9D-D494-4426-93FF-A774D68554D7" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAF6E29D-7041-43D8-A09B-DEF37B0500C5" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3929,23 +3928,23 @@ "matchCriteriaId": "5B4837E0-EFF7-4546-918C-03551E03F6BD" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D56B0CD3-138D-4197-84D5-2887C8FA40D2" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81FC1C9D-D494-4426-93FF-A774D68554D7" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3956,23 +3955,23 @@ "matchCriteriaId": "4E289B26-AF53-442A-9740-2F44D1F59DA5" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_850_mobile_compute_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "355080DC-FC83-45C1-AB1A-21533638C181" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D56B0CD3-138D-4197-84D5-2887C8FA40D2" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3983,23 +3982,23 @@ "matchCriteriaId": "5167E425-3B5D-4F79-B6AF-599820BEB33E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_850_mobile_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "355080DC-FC83-45C1-AB1A-21533638C181" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4010,6 +4009,17 @@ "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624" + } + ] } ] }, @@ -4021,9 +4031,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB987280-8F49-4A31-997C-8055AEB5D36A" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBE1A34C-6C13-4B32-B49C-9DB1E3D32835" } ] }, @@ -4032,9 +4042,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DBE1A34C-6C13-4B32-B49C-9DB1E3D32835" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB987280-8F49-4A31-997C-8055AEB5D36A" } ] } diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28559.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28559.json index b3f47cba9c9..fb977715f4d 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28559.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28559.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28559", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.687", - "lastModified": "2023-09-08T18:29:43.513", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:06.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28560.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28560.json index 1cb8c2f2aca..1250b87871e 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28560.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28560.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28560", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.763", - "lastModified": "2023-09-12T19:46:13.190", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:06.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28561.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28561.json index a05d6bf11fc..adeb1a4c16f 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28561.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28561.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28561", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:14.447", - "lastModified": "2023-08-10T18:17:34.263", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:06.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28562.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28562.json index e91c98bfd84..69adc443878 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28562.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28562.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28562", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.843", - "lastModified": "2023-09-08T18:20:26.257", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:07.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28563.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28563.json index 665021ea4b6..a292eaca67d 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28563.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28563.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28563", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:09.510", - "lastModified": "2023-11-14T18:15:17.510", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:07.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ @@ -160,9 +170,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B032F871-3EC2-427D-A06F-681A58075925" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73286FFB-C267-46B7-8FEF-C96534656AF9" } ] }, @@ -171,9 +181,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ar9380:-:*:*:*:*:*:*:*", - "matchCriteriaId": "73286FFB-C267-46B7-8FEF-C96534656AF9" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B032F871-3EC2-427D-A06F-681A58075925" } ] } @@ -187,9 +197,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AA32CC0-DE30-4B15-8EC6-1FAF14C5C4E2" } ] }, @@ -198,9 +208,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1AA32CC0-DE30-4B15-8EC6-1FAF14C5C4E2" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C" } ] } @@ -3778,9 +3788,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" } ] }, @@ -3789,9 +3799,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" } ] } @@ -3800,17 +3810,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C" - } - ] - }, { "operator": "OR", "negate": false, @@ -3821,23 +3820,23 @@ "matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3848,23 +3847,23 @@ "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3875,23 +3874,23 @@ "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3902,23 +3901,23 @@ "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B" + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -3929,6 +3928,17 @@ "matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B" + } + ] } ] }, @@ -3940,9 +3950,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" } ] }, @@ -3951,9 +3961,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" } ] } @@ -4723,9 +4733,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_665_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D9151A7D-4A02-4EDD-830E-3408BBB2B0C3" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_665_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73D551AC-1008-444B-8A69-CF8CE60942FF" } ] }, @@ -4734,9 +4744,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_665_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "73D551AC-1008-444B-8A69-CF8CE60942FF" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_665_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9151A7D-4A02-4EDD-830E-3408BBB2B0C3" } ] } @@ -4745,17 +4755,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_670_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C9871C72-4B99-43E5-B389-EB26996B08DD" - } - ] - }, { "operator": "OR", "negate": false, @@ -4766,23 +4765,23 @@ "matchCriteriaId": "586E725A-B3F6-4C4D-AE46-0D76A0C0D91E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_675_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "ABF96A66-FECF-4D2F-94C5-7BFC746789E5" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_670_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9871C72-4B99-43E5-B389-EB26996B08DD" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4793,23 +4792,23 @@ "matchCriteriaId": "28638583-F98D-4B88-AF50-A10642D6A105" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_678_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E1B3C6D8-F06D-48DE-9127-0E574578E501" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_675_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABF96A66-FECF-4D2F-94C5-7BFC746789E5" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4820,23 +4819,23 @@ "matchCriteriaId": "A933F383-717C-4D7B-836A-76042F55488F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8D0ED00F-1345-43AD-83C6-E979890B84AB" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_678_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1B3C6D8-F06D-48DE-9127-0E574578E501" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4847,23 +4846,23 @@ "matchCriteriaId": "92C28019-B57D-4487-B551-F7B53395C6E5" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C174F07D-0E33-43FD-9BAD-6C6D8B51B6A6" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D0ED00F-1345-43AD-83C6-E979890B84AB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4874,23 +4873,23 @@ "matchCriteriaId": "47311B68-A07F-448B-99D5-9C92C8127A81" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A930E317-7F22-4605-A85F-144921EEBA0C" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C174F07D-0E33-43FD-9BAD-6C6D8B51B6A6" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4901,23 +4900,23 @@ "matchCriteriaId": "BAF50FDA-47FA-491B-BEAE-76CC38C18F52" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A9A2DA11-5E4E-4E36-923C-A2D3CC2F2751" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A930E317-7F22-4605-A85F-144921EEBA0C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4928,23 +4927,23 @@ "matchCriteriaId": "BE7DFAD4-1D21-4A3A-9E8C-10F00AD7C403" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_710_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEAB1AE-53FE-4641-A2BB-4E1449A76E8C" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9A2DA11-5E4E-4E36-923C-A2D3CC2F2751" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4955,23 +4954,23 @@ "matchCriteriaId": "3E92D896-80E5-47C6-A752-F19F1CB8005D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_712_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C9B4C948-7C2F-41E5-8111-9A17673E2787" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_710_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEAB1AE-53FE-4641-A2BB-4E1449A76E8C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4982,23 +4981,23 @@ "matchCriteriaId": "2504D653-29C7-4F1F-991C-AA50A4E5E092" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E6B6B409-33F8-49CA-9A09-3AA97DCBCE54" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_712_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9B4C948-7C2F-41E5-8111-9A17673E2787" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -5009,6 +5008,17 @@ "matchCriteriaId": "1F34AF35-8A0B-4B90-8AE6-EC961B7FEC4B" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6B6B409-33F8-49CA-9A09-3AA97DCBCE54" + } + ] } ] }, @@ -5020,9 +5030,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BAE7612E-5C12-467E-95EC-90D0A984E086" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D76005A3-22FC-45C1-A01A-8640F030E6A9" } ] }, @@ -5031,9 +5041,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_730_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D76005A3-22FC-45C1-A01A-8640F030E6A9" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAE7612E-5C12-467E-95EC-90D0A984E086" } ] } @@ -5263,9 +5273,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_automotive_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "22B3AB46-81F4-4C45-AF66-C8B36A175685" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_automotive_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A8198E0-C95A-4433-9EC0-F544CAA90251" } ] }, @@ -5274,9 +5284,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_automotive_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1A8198E0-C95A-4433-9EC0-F544CAA90251" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_automotive_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22B3AB46-81F4-4C45-AF66-C8B36A175685" } ] } @@ -5285,17 +5295,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624" - } - ] - }, { "operator": "OR", "negate": false, @@ -5306,6 +5305,17 @@ "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624" + } + ] } ] }, @@ -5317,9 +5327,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BF26AC15-F805-4FEB-9CFC-BD530FA114F6" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17A6D87A-544D-4B8E-884A-0117C499DD8D" } ] }, @@ -5328,9 +5338,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "17A6D87A-544D-4B8E-884A-0117C499DD8D" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF26AC15-F805-4FEB-9CFC-BD530FA114F6" } ] } diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28564.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28564.json index 79e11ad6aa1..3698721b992 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28564.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28564.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28564", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.923", - "lastModified": "2023-09-09T00:01:04.990", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:07.573", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28565.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28565.json index 42d562e37d4..496a3239d03 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28565.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28565.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28565", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.000", - "lastModified": "2023-09-09T00:00:03.907", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:07.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28566.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28566.json index b177abe3b26..4e70c396fd0 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28566.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28566.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28566", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:09.680", - "lastModified": "2023-11-14T18:07:17.730", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:08.377", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ @@ -79,9 +89,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" } ] }, @@ -90,9 +100,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" } ] } @@ -101,17 +111,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3" - } - ] - }, { "operator": "OR", "negate": false, @@ -122,6 +121,17 @@ "matchCriteriaId": "770F3924-BE27-4BDE-B922-680B3C9753EB" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3" + } + ] } ] }, @@ -133,9 +143,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" } ] }, @@ -144,9 +154,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", - "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" } ] } @@ -1159,9 +1169,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" } ] }, @@ -1170,9 +1180,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" } ] } @@ -1181,17 +1191,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" - } - ] - }, { "operator": "OR", "negate": false, @@ -1202,23 +1201,23 @@ "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95" + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1229,6 +1228,17 @@ "matchCriteriaId": "C819454D-D413-478A-B78D-CFF6994803A1" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95" + } + ] } ] }, @@ -1240,9 +1250,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "589C1001-E9F6-41A6-BCC8-A94A3C97F2E6" } ] }, @@ -1251,9 +1261,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", - "matchCriteriaId": "589C1001-E9F6-41A6-BCC8-A94A3C97F2E6" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A" } ] } @@ -1780,9 +1790,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "50906EF2-01F7-4E97-9F49-F892DF41CB29" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B23A89FF-9C94-40C6-B9B7-3E8354777916" } ] }, @@ -1791,9 +1801,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B23A89FF-9C94-40C6-B9B7-3E8354777916" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50906EF2-01F7-4E97-9F49-F892DF41CB29" } ] } @@ -1807,9 +1817,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "873CD3BE-2098-4328-B350-A14453C44F1D" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_660_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE294B26-BBD0-455F-82B0-4605987B7DDC" } ] }, @@ -1818,9 +1828,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_660_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BE294B26-BBD0-455F-82B0-4605987B7DDC" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "873CD3BE-2098-4328-B350-A14453C44F1D" } ] } @@ -2104,9 +2114,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_712_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C9B4C948-7C2F-41E5-8111-9A17673E2787" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_712_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2504D653-29C7-4F1F-991C-AA50A4E5E092" } ] }, @@ -2115,9 +2125,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_712_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2504D653-29C7-4F1F-991C-AA50A4E5E092" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_712_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9B4C948-7C2F-41E5-8111-9A17673E2787" } ] } @@ -2126,17 +2136,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E6B6B409-33F8-49CA-9A09-3AA97DCBCE54" - } - ] - }, { "operator": "OR", "negate": false, @@ -2147,23 +2146,23 @@ "matchCriteriaId": "1F34AF35-8A0B-4B90-8AE6-EC961B7FEC4B" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BAE7612E-5C12-467E-95EC-90D0A984E086" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6B6B409-33F8-49CA-9A09-3AA97DCBCE54" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2174,23 +2173,23 @@ "matchCriteriaId": "D76005A3-22FC-45C1-A01A-8640F030E6A9" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_730g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E454506E-21BE-4BC9-91B9-21DC2AEA63E3" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAE7612E-5C12-467E-95EC-90D0A984E086" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2201,23 +2200,23 @@ "matchCriteriaId": "7D06996C-0832-4406-9581-1327345E95B9" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_732g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A0E3DAEC-1C6C-41D4-867D-A246C51A7F08" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E454506E-21BE-4BC9-91B9-21DC2AEA63E3" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2228,23 +2227,23 @@ "matchCriteriaId": "B4E25E7B-7391-479A-AE10-E593ADF7A5B1" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A96C773B-B228-4A39-8CAE-AEA0EE6E5699" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_732g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0E3DAEC-1C6C-41D4-867D-A246C51A7F08" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -2255,6 +2254,17 @@ "matchCriteriaId": "898FE463-291B-4C89-BEC5-8B99EA18CF23" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A96C773B-B228-4A39-8CAE-AEA0EE6E5699" + } + ] } ] }, @@ -2266,9 +2276,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1C9940B4-672B-4D82-B904-80A3FC1DD4C2" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11ADEB65-9803-4036-AAB4-B85E430B626D" } ] }, @@ -2277,9 +2287,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "11ADEB65-9803-4036-AAB4-B85E430B626D" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C9940B4-672B-4D82-B904-80A3FC1DD4C2" } ] } diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28567.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28567.json index 43b9d3eb08c..cb79ce07341 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28567.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28567.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28567", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.083", - "lastModified": "2023-09-08T18:41:43.067", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:08.633", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28568.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28568.json index 17c1ed422a5..68a0cf783cc 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28568.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28568.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28568", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:09.840", - "lastModified": "2023-11-14T18:06:38.107", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:09.043", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28569.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28569.json index c8ca38eb427..7acfedf94da 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28569.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28569.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28569", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:10.020", - "lastModified": "2023-11-14T18:57:56.427", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:09.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28570.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28570.json index 1bb184f8029..9187f9d89ab 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28570.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28570.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28570", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:10.173", - "lastModified": "2023-11-14T18:57:32.993", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:09.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28571.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28571.json index 52838f9f007..b9a3e78c349 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28571.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28571.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28571", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:24.657", - "lastModified": "2023-10-04T19:55:13.527", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:10.120", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28572.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28572.json index 8245b64721e..542e4dcf230 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28572.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28572.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28572", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:10.323", - "lastModified": "2023-11-14T18:57:00.267", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:10.347", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28573.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28573.json index 11df131c290..555925fc15e 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28573.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28573.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28573", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.167", - "lastModified": "2023-09-08T18:39:01.407", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:10.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28574.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28574.json index 2b5f8f48a69..6e82b4afada 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28574.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28574.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28574", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:10.480", - "lastModified": "2023-11-14T18:56:24.250", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:11.043", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28575.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28575.json index be77aae6041..557a0908412 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28575.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28575.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28575", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:14.537", - "lastModified": "2023-08-15T15:56:24.943", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:11.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-843" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ @@ -1105,9 +1115,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7F15FC88-6366-4210-A949-75A3890476B2" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "711C5A1C-F67B-4BE2-BFE7-C86E716F85E2" } ] }, @@ -1116,9 +1126,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g:-:*:*:*:*:*:*:*", - "matchCriteriaId": "711C5A1C-F67B-4BE2-BFE7-C86E716F85E2" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F15FC88-6366-4210-A949-75A3890476B2" } ] } @@ -1127,17 +1137,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B6D89373-04BA-4DD4-A0D0-A45AF93FA7AB" - } - ] - }, { "operator": "OR", "negate": false, @@ -1148,23 +1147,23 @@ "matchCriteriaId": "FE485ADB-9A68-41AE-BBA8-242AC27263DD" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "158F6ED7-FB30-47BF-BDAE-91BED7A58157" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6D89373-04BA-4DD4-A0D0-A45AF93FA7AB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1175,23 +1174,23 @@ "matchCriteriaId": "89A06BE0-4F54-4591-836D-4D70D9976BBE" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_4100\\+_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EA1AEB2C-F420-46A6-8804-A35870153BAA" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "158F6ED7-FB30-47BF-BDAE-91BED7A58157" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1202,23 +1201,23 @@ "matchCriteriaId": "20746D0A-8D06-4483-AE84-2E0232259171" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "50081C21-0E3C-451C-B5D9-BFA6763FC92A" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_4100\\+_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA1AEB2C-F420-46A6-8804-A35870153BAA" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1229,23 +1228,23 @@ "matchCriteriaId": "F8D443BF-15A5-4984-972B-0BC5BEDC835B" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "665811D8-F648-4F32-A375-FAF9C9E928B3" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50081C21-0E3C-451C-B5D9-BFA6763FC92A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1256,23 +1255,23 @@ "matchCriteriaId": "2A537932-6EAD-411B-83FF-48CF050F603A" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "665811D8-F648-4F32-A375-FAF9C9E928B3" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1283,23 +1282,23 @@ "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1310,23 +1309,23 @@ "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1337,23 +1336,23 @@ "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1364,23 +1363,23 @@ "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1391,6 +1390,17 @@ "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] } ] }, @@ -1402,9 +1412,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" } ] }, @@ -1413,9 +1423,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" } ] } diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28576.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28576.json index 31fc14a5d90..0e932d4c99f 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28576.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28576.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28576", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:14.640", - "lastModified": "2023-08-15T16:24:42.893", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:11.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-367" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28577.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28577.json index bcb3358bb00..ef7720321c6 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28577.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28577.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28577", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-08-08T10:15:14.760", - "lastModified": "2023-08-15T13:43:28.633", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:11.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28579.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28579.json index 1dd4902b640..00b8a81240a 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28579.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28579.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28579", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:09.233", - "lastModified": "2023-12-11T14:51:58.197", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:10.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28580.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28580.json index 16b189aedfb..5f3b037f17c 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28580.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28580.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28580", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:09.390", - "lastModified": "2023-12-12T16:52:17.877", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:11.110", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28581.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28581.json index 6a2bdf236e9..a2aa671f150 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28581.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28581.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28581", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.247", - "lastModified": "2023-09-08T18:32:42.107", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:12.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28583.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28583.json index d8aa977782f..b71a2d777cd 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28583.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28583.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28583", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:08.490", - "lastModified": "2024-01-08T17:48:54.100", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:11.243", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-415" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28584.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28584.json index 26874aa2a22..621d820fff3 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28584.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28584.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28584", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.323", - "lastModified": "2023-09-08T23:32:56.167", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:12.277", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28585.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28585.json index bc26c5bd7ea..e8014699e00 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28585.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28585.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28585", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:09.563", - "lastModified": "2023-12-12T16:16:10.227", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:11.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-119" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-680" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28586.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28586.json index ef9fa8c1945..4bb6c37a3fa 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28586.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28586.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28586", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:09.750", - "lastModified": "2023-12-12T16:11:28.417", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:11.777", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-119" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28587.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28587.json index 88d8b2ec512..1c65ae07f11 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28587.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28587.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28587", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:09.927", - "lastModified": "2023-12-12T16:52:13.027", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:12.210", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28588.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28588.json index 04dfbd3be2a..933e03a3141 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28588.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28588.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28588", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:10.103", - "lastModified": "2023-12-12T17:00:54.277", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:12.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-190" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33014.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33014.json index 125eb202013..1f1f0d6f093 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33014.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33014.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33014", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:08.763", - "lastModified": "2024-02-16T20:46:08.317", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:12.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-20" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33015.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33015.json index dd3379cf46e..a0639284314 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33015.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33015.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33015", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.407", - "lastModified": "2023-09-08T23:27:37.453", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:12.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33016.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33016.json index 7b3e6c7dbdc..82315037670 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33016.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33016.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33016", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.487", - "lastModified": "2023-09-08T23:14:37.230", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:14.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33017.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33017.json index 9b691726df6..0c26a8ce86e 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33017.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33017.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33017", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:10.290", - "lastModified": "2023-12-11T17:49:10.307", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:13.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33018.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33018.json index 16186eb4cac..67eb0c6ee53 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33018.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33018.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33018", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:10.480", - "lastModified": "2023-12-11T17:49:48.960", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:13.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-190" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-680" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33019.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33019.json index 0417ec98b70..dabe25360c7 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33019.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33019.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33019", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.560", - "lastModified": "2023-09-08T23:04:18.557", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:15.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33020.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33020.json index 8b2ff5bc407..dec34e538f1 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33020.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33020.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33020", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.640", - "lastModified": "2023-09-08T16:46:27.047", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:15.340", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33021.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33021.json index e0370544c23..ab3e6e94bc4 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33021.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33021.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33021", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:14.717", - "lastModified": "2023-09-08T16:47:15.713", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:15.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33022.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33022.json index 765a2777101..35c64ac2745 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33022.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33022.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33022", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:10.660", - "lastModified": "2023-12-11T17:50:30.010", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:13.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-190" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-680" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33024.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33024.json index f192f4828f1..a0313df4173 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33024.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33024.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33024", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:10.833", - "lastModified": "2023-12-11T17:51:28.897", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:14.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33025.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33025.json index 2b8ec3a47c9..db48c74953e 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33025.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33025.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33025", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:08.967", - "lastModified": "2024-01-08T18:40:01.160", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:14.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33026.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33026.json index 8e64e4751af..72de80adf9c 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33026.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33026.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33026", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:26.620", - "lastModified": "2023-10-04T19:54:35.327", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:16.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-400" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33027.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33027.json index b058164ce28..af08a2eadc8 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33027.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33027.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33027", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:26.850", - "lastModified": "2023-10-05T15:33:11.150", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:16.477", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ @@ -700,9 +710,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7BB0662A-2D27-4AE7-8370-0B567B9A8214" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_326_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "67970B89-2F06-4E4A-88CA-9D37C060C1BA" } ] }, @@ -711,9 +721,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:immersive_home_326_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "67970B89-2F06-4E4A-88CA-9D37C060C1BA" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BB0662A-2D27-4AE7-8370-0B567B9A8214" } ] } @@ -1186,9 +1196,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "93E5DB9B-F388-49F3-ABD5-CE773FC4B045" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0137E60A-1869-479C-9B4B-378E5FCCBA1D" } ] }, @@ -1197,9 +1207,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0137E60A-1869-479C-9B4B-378E5FCCBA1D" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93E5DB9B-F388-49F3-ABD5-CE773FC4B045" } ] } @@ -1208,17 +1218,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2914BF98-E69C-4C8D-8B10-759642ADD7B4" - } - ] - }, { "operator": "OR", "negate": false, @@ -1229,23 +1228,23 @@ "matchCriteriaId": "2118C404-402F-463C-8160-3CC3B703DF30" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5C7691C2-C4F8-4F23-9B5F-5E8FE0E2293E" + "criteria": "cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2914BF98-E69C-4C8D-8B10-759642ADD7B4" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1256,23 +1255,23 @@ "matchCriteriaId": "02BF2E50-E2A4-44FF-9748-ED96C0C1AB5F" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "966392A8-DD8E-4AA1-B407-5BF2D937139E" + "criteria": "cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C7691C2-C4F8-4F23-9B5F-5E8FE0E2293E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1283,23 +1282,23 @@ "matchCriteriaId": "A211C022-8EDF-4B76-89D6-599812900446" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EF245F8E-C056-4BEF-982E-9616F8C65CD6" + "criteria": "cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "966392A8-DD8E-4AA1-B407-5BF2D937139E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1310,23 +1309,23 @@ "matchCriteriaId": "CE302EF9-165F-47F9-B0D6-BE1E3D8C6C65" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A24951FD-C4AB-4988-A1DD-019412430AC6" + "criteria": "cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF245F8E-C056-4BEF-982E-9616F8C65CD6" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1337,6 +1336,17 @@ "matchCriteriaId": "EFEC5D65-C1E3-40ED-9FE3-8DF888CA2654" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A24951FD-C4AB-4988-A1DD-019412430AC6" + } + ] } ] }, @@ -1348,9 +1358,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DF609C6C-CD50-423A-A75E-83C730296089" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8B35C18-9A01-41E1-8CE9-D8FA7E4A25ED" } ] }, @@ -1359,9 +1369,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B8B35C18-9A01-41E1-8CE9-D8FA7E4A25ED" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF609C6C-CD50-423A-A75E-83C730296089" } ] } @@ -1672,9 +1682,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca0000_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CC941093-1A7C-47B2-AB3B-05AE4AE2FBE4" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca0000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A2AA834-C17C-4E0E-A510-795818041E47" } ] }, @@ -1683,9 +1693,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca0000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7A2AA834-C17C-4E0E-A510-795818041E47" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca0000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC941093-1A7C-47B2-AB3B-05AE4AE2FBE4" } ] } @@ -1694,17 +1704,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca1062_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7B3F80BD-90EA-4207-BCB2-5E5CE80B599A" - } - ] - }, { "operator": "OR", "negate": false, @@ -1715,23 +1714,23 @@ "matchCriteriaId": "AEB9196D-4EE0-4978-8A80-C21B5DC0CF21" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca1064_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CBC2C38C-5D5F-49CB-8DF5-35974D13B40B" + "criteria": "cpe:2.3:o:qualcomm:qca1062_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B3F80BD-90EA-4207-BCB2-5E5CE80B599A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1742,23 +1741,23 @@ "matchCriteriaId": "365FE873-2311-44B8-B699-4B2F3459B0B2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca2062_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "54C350AB-526B-4681-9C37-DD508EFFB143" + "criteria": "cpe:2.3:o:qualcomm:qca1064_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBC2C38C-5D5F-49CB-8DF5-35974D13B40B" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1769,6 +1768,17 @@ "matchCriteriaId": "1ACBDBFC-796A-428E-9570-77E488FA1CB3" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca2062_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54C350AB-526B-4681-9C37-DD508EFFB143" + } + ] } ] }, @@ -1780,9 +1790,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca2064_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E73670B4-1055-4C65-AD34-EB978ABB19A6" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca2064:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C774D66F-60C9-46B8-BE1D-B8D61EE5E844" } ] }, @@ -1791,9 +1801,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca2064:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C774D66F-60C9-46B8-BE1D-B8D61EE5E844" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca2064_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E73670B4-1055-4C65-AD34-EB978ABB19A6" } ] } @@ -4588,9 +4598,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64" } ] }, @@ -4599,9 +4609,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", - "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" } ] } @@ -4610,17 +4620,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" - } - ] - }, { "operator": "OR", "negate": false, @@ -4631,23 +4630,23 @@ "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -4658,6 +4657,17 @@ "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + } + ] } ] }, @@ -4669,9 +4679,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA" } ] }, @@ -4680,9 +4690,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" } ] } @@ -5911,9 +5921,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52" } ] }, @@ -5922,9 +5932,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" } ] } @@ -5933,17 +5943,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:apq5053-aa_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "35953900-1F81-49B4-B2F4-A0FEEF0E4F08" - } - ] - }, { "operator": "OR", "negate": false, @@ -5954,6 +5953,17 @@ "matchCriteriaId": "21E3FCA2-6CD3-4C63-9EFB-783FEF08D170" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:apq5053-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35953900-1F81-49B4-B2F4-A0FEEF0E4F08" + } + ] } ] }, @@ -5965,9 +5975,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm4375_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "117FAAF8-4E79-4BA8-BF6B-4572C114890F" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "233283A4-193F-430A-8019-EE1B83668E36" } ] }, @@ -5976,9 +5986,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sm4375:-:*:*:*:*:*:*:*", - "matchCriteriaId": "233283A4-193F-430A-8019-EE1B83668E36" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117FAAF8-4E79-4BA8-BF6B-4572C114890F" } ] } @@ -6478,9 +6488,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm7125_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "055E464C-C63A-455E-97B0-0D8A266A428F" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "527A0A00-0C6C-4937-87A3-00668CF7BACB" } ] }, @@ -6489,9 +6499,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sm7125:-:*:*:*:*:*:*:*", - "matchCriteriaId": "527A0A00-0C6C-4937-87A3-00668CF7BACB" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "055E464C-C63A-455E-97B0-0D8A266A428F" } ] } @@ -6500,17 +6510,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm7150-aa_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E66B0335-F592-4670-8E7D-7952396B88CA" - } - ] - }, { "operator": "OR", "negate": false, @@ -6521,6 +6520,17 @@ "matchCriteriaId": "3FA9B931-E55A-4717-A700-C3717B681824" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7150-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E66B0335-F592-4670-8E7D-7952396B88CA" + } + ] } ] }, @@ -6532,9 +6542,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm7150-ab_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6DB73734-92EE-4123-8D02-C7D0CE3029C1" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7150-ab:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4D107A6-3120-4B08-B34C-A8C180474DDB" } ] }, @@ -6543,9 +6553,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sm7150-ab:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F4D107A6-3120-4B08-B34C-A8C180474DDB" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7150-ab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DB73734-92EE-4123-8D02-C7D0CE3029C1" } ] } @@ -6856,9 +6866,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9" } ] }, @@ -6867,9 +6877,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" } ] } @@ -6878,17 +6888,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm8450_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A38C0AFD-D666-423C-8903-BB026965D97C" - } - ] - }, { "operator": "OR", "negate": false, @@ -6899,23 +6898,23 @@ "matchCriteriaId": "59DBE92C-D428-4952-B94F-B46B3A627DFD" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739" + "criteria": "cpe:2.3:o:qualcomm:sm8450_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A38C0AFD-D666-423C-8903-BB026965D97C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6926,23 +6925,23 @@ "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm8475_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "73CB0B0B-8448-4961-85A3-BC32A8567A21" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6953,23 +6952,23 @@ "matchCriteriaId": "E626A19A-DBE3-4DE9-90DA-FA3F883FF3CF" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545" + "criteria": "cpe:2.3:o:qualcomm:sm8475_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73CB0B0B-8448-4961-85A3-BC32A8567A21" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -6980,23 +6979,23 @@ "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:8098_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0AE7A51B-739F-4264-B978-25DC9620B638" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -7007,23 +7006,23 @@ "matchCriteriaId": "134C30E3-8D6D-4BD2-8FBD-91CC4D614BC8" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:8998_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F10CB414-1CA8-4AC1-8E16-841AC2E87FDF" + "criteria": "cpe:2.3:o:qualcomm:8098_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE7A51B-739F-4264-B978-25DC9620B638" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -7034,23 +7033,23 @@ "matchCriteriaId": "A028D7DE-ED28-44BA-8D59-92DFC827FCAB" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D56B0CD3-138D-4197-84D5-2887C8FA40D2" + "criteria": "cpe:2.3:o:qualcomm:8998_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F10CB414-1CA8-4AC1-8E16-841AC2E87FDF" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -7061,23 +7060,23 @@ "matchCriteriaId": "4E289B26-AF53-442A-9740-2F44D1F59DA5" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_850_mobile_compute_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "355080DC-FC83-45C1-AB1A-21533638C181" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D56B0CD3-138D-4197-84D5-2887C8FA40D2" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -7088,23 +7087,23 @@ "matchCriteriaId": "5167E425-3B5D-4F79-B6AF-599820BEB33E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9286B1E8-E39F-4DAA-8969-311CA2A0A8AA" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_850_mobile_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "355080DC-FC83-45C1-AB1A-21533638C181" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -7115,23 +7114,23 @@ "matchCriteriaId": "19B9AE36-87A9-4EE7-87C8-CCA2DCF51039" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm8150-ac_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DC335397-8340-4DD4-B8D1-9AB6E9911F85" + "criteria": "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9286B1E8-E39F-4DAA-8969-311CA2A0A8AA" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -7142,23 +7141,23 @@ "matchCriteriaId": "CB6CF9F9-8EEE-49AD-B17D-60470F2F9D57" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DDC730C6-FB32-4566-AAE2-B2B261BA9411" + "criteria": "cpe:2.3:o:qualcomm:sm8150-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC335397-8340-4DD4-B8D1-9AB6E9911F85" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -7169,6 +7168,17 @@ "matchCriteriaId": "5A432773-467F-492C-AA3A-ADF08A21FB3F" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDC730C6-FB32-4566-AAE2-B2B261BA9411" + } + ] } ] }, @@ -7180,9 +7190,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:sm8250-ab_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2723E7F4-1381-4542-83BA-E65728F6CA5B" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8250-ab:-:*:*:*:*:*:*:*", + "matchCriteriaId": "918F0BEB-A38E-4801-ADE2-280D26F9A87C" } ] }, @@ -7191,9 +7201,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:sm8250-ab:-:*:*:*:*:*:*:*", - "matchCriteriaId": "918F0BEB-A38E-4801-ADE2-280D26F9A87C" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8250-ab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2723E7F4-1381-4542-83BA-E65728F6CA5B" } ] } @@ -8584,9 +8594,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" } ] }, @@ -8595,9 +8605,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" } ] } @@ -8606,17 +8616,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" - } - ] - }, { "operator": "OR", "negate": false, @@ -8627,23 +8626,23 @@ "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -8654,6 +8653,17 @@ "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + } + ] } ] }, @@ -8665,9 +8675,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DF49BC31-A332-4B9A-A826-F63116D7029F" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DD3C245-D5F8-4145-8CDF-F635D2C8F088" } ] }, @@ -8676,9 +8686,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6DD3C245-D5F8-4145-8CDF-F635D2C8F088" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF49BC31-A332-4B9A-A826-F63116D7029F" } ] } diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33028.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33028.json index 832fd9b9f71..f814506dc8b 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33028.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33028.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33028", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:27.103", - "lastModified": "2023-10-05T15:28:33.267", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:16.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33029.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33029.json index b692bbb1ae9..9ea7c0cc8f0 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33029.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33029.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33029", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:27.360", - "lastModified": "2023-10-05T15:28:09.890", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:17.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33030.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33030.json index 0ab0a979715..76266be2c8e 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33030.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33030.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33030", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:09.157", - "lastModified": "2024-01-09T19:03:15.717", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:14.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33031.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33031.json index 973b0e91d81..9a53b5094f1 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33031.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33031.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33031", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:10.633", - "lastModified": "2023-11-14T18:55:30.877", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:17.647", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ @@ -1645,9 +1655,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B" } ] }, @@ -1656,9 +1666,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" } ] } @@ -1667,17 +1677,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42" - } - ] - }, { "operator": "OR", "negate": false, @@ -1688,23 +1687,23 @@ "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1715,23 +1714,23 @@ "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1742,23 +1741,23 @@ "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1769,23 +1768,23 @@ "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1796,23 +1795,23 @@ "matchCriteriaId": "F68F9B33-6BA5-46E1-A370-547CDA626985" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198" + "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1823,23 +1822,23 @@ "matchCriteriaId": "2D13E375-0562-4263-8452-53E117F14E83" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1850,23 +1849,23 @@ "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1877,23 +1876,23 @@ "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1904,23 +1903,23 @@ "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -1931,6 +1930,17 @@ "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + } + ] } ] }, @@ -1942,9 +1952,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA" } ] }, @@ -1953,9 +1963,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" } ] } diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33032.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33032.json index 3a40a5ec7f7..972ca9d0214 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33032.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33032.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33032", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:09.357", - "lastModified": "2024-01-09T15:18:49.570", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:15.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33033.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33033.json index b2baa73a49a..c43a7ed3d4c 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33033.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33033.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33033", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:09.547", - "lastModified": "2024-01-09T15:28:54.313", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:15.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33034.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33034.json index a2b383aca41..7884c3bc4d7 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33034.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33034.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33034", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:27.607", - "lastModified": "2023-10-05T15:15:46.267", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:17.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-195" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33035.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33035.json index a8ff08f4797..225e768213d 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33035.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33035.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33035", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:27.787", - "lastModified": "2023-10-05T16:21:44.783", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:18.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33036.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33036.json index d0c632e1504..9e978204116 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33036.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33036.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33036", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:09.750", - "lastModified": "2024-01-08T18:40:51.257", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:16.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-476" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33037.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33037.json index 2f4c1c660bb..5ecfb1e2a9f 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33037.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33037.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33037", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:10.020", - "lastModified": "2024-01-09T19:12:53.033", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:16.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-311" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-310" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33038.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33038.json index ed4c46a7e77..c7c999b6258 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33038.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33038.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33038", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:10.240", - "lastModified": "2024-01-09T19:14:32.847", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:16.643", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33039.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33039.json index 0c9556c2e30..49de382f366 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33039.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33039.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33039", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:27.877", - "lastModified": "2023-10-04T21:18:51.943", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:18.543", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33040.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33040.json index a14771f7458..7972945ce9f 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33040.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33040.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33040", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:10.430", - "lastModified": "2024-01-09T19:14:51.203", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:16.893", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33041.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33041.json index e9dddc725db..f8bdcf1757f 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33041.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33041.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33041", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:11.013", - "lastModified": "2023-12-11T17:52:30.027", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:17.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33042.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33042.json index 4e4c38b6b0d..3331a903d41 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33042.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33042.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33042", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:11.187", - "lastModified": "2023-12-11T17:53:27.723", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:17.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-20" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33043.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33043.json index 9f4ffd679c0..2d8ff0304c2 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33043.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33043.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33043", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:11.360", - "lastModified": "2023-12-11T17:54:32.727", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:17.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33044.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33044.json index 3d5db9299a1..8984dc4304c 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33044.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33044.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33044", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:11.530", - "lastModified": "2023-12-11T18:03:59.473", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:17.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33045.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33045.json index 9927876d563..26cbd5cebe6 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33045.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33045.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33045", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:10.810", - "lastModified": "2023-11-14T18:55:01.147", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:18.683", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33046.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33046.json index 62167803820..6386e02ac75 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33046.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33046.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33046", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:15:58.807", - "lastModified": "2024-02-09T01:11:34.037", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:17.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -72,6 +72,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33047.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33047.json index aaa9e4e6661..0a8b371e121 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33047.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33047.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33047", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:10.963", - "lastModified": "2023-11-14T18:54:29.070", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:18.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33048.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33048.json index bf81c8ffb5f..a2a62d3816a 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33048.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33048.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33048", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:11.120", - "lastModified": "2023-11-14T18:53:55.253", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:19.263", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33049.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33049.json index a6b1d3ef767..bc25b4697b0 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33049.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33049.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33049", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:15:59.043", - "lastModified": "2024-02-09T01:10:50.280", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:18.180", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "CWE-401" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33053.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33053.json index 7b527d15348..0b0f0c158e4 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33053.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33053.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33053", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:11.707", - "lastModified": "2023-12-11T18:06:27.913", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:18.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-129" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33054.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33054.json index d336c53a1f0..efb2940da55 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33054.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33054.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33054", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:11.880", - "lastModified": "2023-12-11T18:13:32.720", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:18.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-287" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33055.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33055.json index 8f29dd44118..a92d9b5b7d9 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33055.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33055.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33055", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:11.273", - "lastModified": "2023-11-14T19:38:01.227", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:19.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33056.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33056.json index af327cccb5c..dbe58df481e 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33056.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33056.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33056", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:11.420", - "lastModified": "2023-11-14T19:37:15.550", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:19.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-476" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33057.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33057.json index e858421a0ab..1a0eed30e9e 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33057.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33057.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33057", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:15:59.217", - "lastModified": "2024-02-09T01:10:39.467", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:19.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "CWE-20" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33058.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33058.json index 33ac6703f1a..792f3d32e8d 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33058.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33058.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33058", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:15:59.393", - "lastModified": "2024-02-09T01:10:31.330", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:19.237", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33059.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33059.json index 281a77536e1..38d85ce7978 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33059.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33059.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33059", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:11.570", - "lastModified": "2023-11-14T19:37:00.287", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:20.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33060.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33060.json index 712fabab009..ff7fdb322af 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33060.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33060.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33060", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:15:59.613", - "lastModified": "2024-02-09T01:09:39.027", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:19.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33061.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33061.json index 12f33be13a6..2929dee9d74 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33061.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33061.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33061", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:11.727", - "lastModified": "2023-11-14T19:36:36.217", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:20.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33062.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33062.json index 291fc70377a..3a7281ba68c 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33062.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33062.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33062", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:10.627", - "lastModified": "2024-01-09T19:15:06.537", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:19.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33063.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33063.json index 6df7739aa53..123cb29a705 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33063.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33063.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33063", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:12.067", - "lastModified": "2023-12-11T18:20:10.893", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:20.047", + "vulnStatus": "Modified", "cisaExploitAdd": "2023-12-05", "cisaActionDue": "2023-12-26", "cisaRequiredAction": "Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.", @@ -72,6 +72,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33064.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33064.json index 1c71df41970..a651b90df32 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33064.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33064.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33064", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:15:59.780", - "lastModified": "2024-02-09T01:08:59.433", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:20.483", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33065.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33065.json index bff2edb1421..320ca896302 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33065.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33065.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33065", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:15:59.940", - "lastModified": "2024-02-08T22:10:10.700", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:20.683", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33067.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33067.json index 15d2be9b370..92d27f75cc1 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33067.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33067.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33067", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:00.117", - "lastModified": "2024-02-08T22:18:01.073", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:20.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33068.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33068.json index 7db033ddefd..c01e945aa15 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33068.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33068.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33068", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:00.283", - "lastModified": "2024-02-08T22:18:32.903", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:21.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33069.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33069.json index fb0856614c2..dc7f1776897 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33069.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33069.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33069", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:00.447", - "lastModified": "2024-02-08T22:19:01.727", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:21.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33070.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33070.json index d34d04ff838..3d3cb99b23d 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33070.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33070.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33070", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:12.253", - "lastModified": "2023-12-11T18:43:52.907", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:21.727", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-287" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33071.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33071.json index 9d4acadbd00..cdff03ae0c3 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33071.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33071.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33071", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:12.433", - "lastModified": "2023-12-11T18:45:23.717", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:21.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-863" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33072.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33072.json index af6c3727dca..7a19000cfd2 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33072.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33072.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33072", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:00.610", - "lastModified": "2024-02-08T22:21:49.550", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:22.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33074.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33074.json index ae3adbdc37f..6221f16c9b4 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33074.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33074.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33074", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-11-07T06:15:11.873", - "lastModified": "2023-11-14T19:36:13.940", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T17:17:20.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33076.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33076.json index aae54e780b5..564b7d44d6c 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33076.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33076.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33076", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:00.783", - "lastModified": "2024-02-08T22:23:06.457", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:22.597", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-16" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33077.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33077.json index 8fb8d10e72a..b5fadab83ba 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33077.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33077.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33077", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:00.953", - "lastModified": "2024-02-08T22:23:50.630", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:22.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33079.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33079.json index 57cbcf7d57b..a7f21e2540f 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33079.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33079.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33079", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:12.600", - "lastModified": "2023-12-11T18:54:15.047", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:23.100", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-119" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33080.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33080.json index c467c222718..489d1618f82 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33080.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33080.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33080", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:12.773", - "lastModified": "2023-12-11T19:47:36.047", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:23.350", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33081.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33081.json index 212c030f9e9..ae364d3fce1 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33081.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33081.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33081", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:12.957", - "lastModified": "2023-12-11T19:46:53.910", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:23.927", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33082.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33082.json index 0476324a657..58f00ca609f 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33082.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33082.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33082", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:13.137", - "lastModified": "2023-12-11T15:14:43.010", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:24.203", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33083.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33083.json index e7d20ab647a..417aafbd9fc 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33083.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33083.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33083", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:13.327", - "lastModified": "2023-12-11T15:14:17.950", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:24.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33085.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33085.json index 94ca12ec134..d17186cc9d5 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33085.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33085.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33085", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:10.813", - "lastModified": "2024-01-08T18:45:18.993", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:24.687", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33087.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33087.json index 998c0c555b4..cbe4c294cc2 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33087.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33087.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33087", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:13.520", - "lastModified": "2023-12-11T15:13:33.843", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:24.917", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33088.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33088.json index 5fd9fb72eeb..f4e62f76699 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33088.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33088.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33088", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:13.703", - "lastModified": "2023-12-11T15:12:40.463", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:25.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-476" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33089.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33089.json index 9dacffb9e93..ac68e559228 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33089.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33089.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33089", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:13.893", - "lastModified": "2023-12-11T15:12:11.797", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:25.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-476" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33092.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33092.json index 4c0d19ca26d..e7c434499b9 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33092.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33092.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33092", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:14.143", - "lastModified": "2023-12-11T15:10:32.717", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:26.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-119" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33094.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33094.json index 8a2e7f0ceab..b5c09306778 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33094.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33094.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33094", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:11.007", - "lastModified": "2024-01-09T19:16:41.780", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:26.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33097.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33097.json index bc225a82f92..c7cc2df0863 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33097.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33097.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33097", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:14.317", - "lastModified": "2023-12-11T15:09:50.730", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:26.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33098.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33098.json index 8c287d77cbf..f9e3692707a 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33098.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33098.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33098", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:14.493", - "lastModified": "2023-12-11T15:09:02.400", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:26.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33106.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33106.json index 4ad11d19c27..de69700f777 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33106.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33106.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33106", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:14.673", - "lastModified": "2023-12-11T15:06:16.443", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:27.653", + "vulnStatus": "Modified", "cisaExploitAdd": "2023-12-05", "cisaActionDue": "2023-12-26", "cisaRequiredAction": "Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.", @@ -72,6 +72,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ @@ -83,9 +93,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" } ] }, @@ -94,9 +104,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" } ] } @@ -105,17 +115,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" - } - ] - }, { "operator": "OR", "negate": false, @@ -126,23 +125,23 @@ "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -153,23 +152,23 @@ "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -180,23 +179,23 @@ "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -207,23 +206,23 @@ "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -234,23 +233,23 @@ "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -261,23 +260,23 @@ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -288,6 +287,17 @@ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] } ] }, @@ -299,9 +309,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324" } ] }, @@ -310,9 +320,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" } ] } diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33107.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33107.json index 8dc22e5f865..07ce9d4d1a7 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33107.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33107.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33107", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:14.860", - "lastModified": "2023-12-11T15:02:42.090", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:28.040", + "vulnStatus": "Modified", "cisaExploitAdd": "2023-12-05", "cisaActionDue": "2023-12-26", "cisaRequiredAction": "Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.", @@ -72,6 +72,16 @@ "value": "CWE-190" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33108.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33108.json index 6701878ba41..b8106effc38 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33108.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33108.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33108", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:11.193", - "lastModified": "2024-01-08T18:46:16.817", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:28.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33109.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33109.json index 3cfde090ca8..849dc93d900 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33109.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33109.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33109", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:11.377", - "lastModified": "2024-01-09T19:16:58.157", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:28.787", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "CWE-476" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33110.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33110.json index 0ab448df712..255d9c59833 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33110.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33110.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33110", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:11.570", - "lastModified": "2024-01-09T19:19:50.700", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:29.317", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-362" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ @@ -79,9 +89,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_425_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "58E5A10C-4B4C-48F7-9973-999726108CAB" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_425_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E657C793-12DB-4FCB-91C9-11DB09CA6E12" } ] }, @@ -90,9 +100,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_425_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E657C793-12DB-4FCB-91C9-11DB09CA6E12" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_425_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58E5A10C-4B4C-48F7-9973-999726108CAB" } ] } @@ -101,17 +111,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_427_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2F14333C-C942-4459-8B6C-7F55680FCB6C" - } - ] - }, { "operator": "OR", "negate": false, @@ -122,23 +121,23 @@ "matchCriteriaId": "7A414528-2D24-4234-B882-7D2EFF3D3CCD" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "487D6D28-F007-4726-AB69-F68B1FF4CA3E" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_427_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F14333C-C942-4459-8B6C-7F55680FCB6C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -149,23 +148,23 @@ "matchCriteriaId": "EB8FE3BF-8A02-4928-BA5F-BF2457D2C8CF" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_430_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9592C275-7991-43DE-BEAD-2B49E371C0CE" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "487D6D28-F007-4726-AB69-F68B1FF4CA3E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -176,23 +175,23 @@ "matchCriteriaId": "53D34409-510B-4703-B471-494453AFE42A" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_435_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0FA673D3-A876-4B19-BBBA-724CBBD5CD61" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_430_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9592C275-7991-43DE-BEAD-2B49E371C0CE" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -203,23 +202,23 @@ "matchCriteriaId": "00AE37F3-8AF2-453E-A2CC-AE08C81FBED8" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_439_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "60D19880-121E-43DD-98C5-502DEF7B51A2" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_435_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FA673D3-A876-4B19-BBBA-724CBBD5CD61" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -230,23 +229,23 @@ "matchCriteriaId": "CB7F9CDC-16EE-405B-AFC8-A691ECAE864E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_450_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5EC69260-5A77-4125-BF61-BBCE45547935" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_439_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60D19880-121E-43DD-98C5-502DEF7B51A2" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -257,23 +256,23 @@ "matchCriteriaId": "F6789900-34DF-48C8-8920-0F1BEEBE194E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "390D7CAF-6C0B-4438-AA7D-AEEE127F4D3C" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_450_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5EC69260-5A77-4125-BF61-BBCE45547935" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -284,23 +283,23 @@ "matchCriteriaId": "5BB1FC5E-CF6F-4E54-B78D-C01AFD034903" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CA3F11F3-C9F4-460D-BD77-1BFBCC1F0592" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "390D7CAF-6C0B-4438-AA7D-AEEE127F4D3C" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -311,23 +310,23 @@ "matchCriteriaId": "25673A10-D99C-4F67-BDA7-9C2E4A70EF9C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "50906EF2-01F7-4E97-9F49-F892DF41CB29" + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA3F11F3-C9F4-460D-BD77-1BFBCC1F0592" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -338,6 +337,17 @@ "matchCriteriaId": "B23A89FF-9C94-40C6-B9B7-3E8354777916" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50906EF2-01F7-4E97-9F49-F892DF41CB29" + } + ] } ] }, @@ -349,9 +359,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:snapdragon_625_mobile_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B6647DA1-A755-43DF-943B-E724F83A2216" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_625_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A0D9023-3BAD-4C7F-89B8-B79808071E26" } ] }, @@ -360,9 +370,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:snapdragon_625_mobile_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4A0D9023-3BAD-4C7F-89B8-B79808071E26" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_625_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6647DA1-A755-43DF-943B-E724F83A2216" } ] } diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33112.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33112.json index 2d2a3cc3e72..96b7c1b5a1d 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33112.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33112.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33112", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:11.763", - "lastModified": "2024-01-09T19:21:32.643", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:29.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33113.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33113.json index 80831e68f18..d319864d7f8 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33113.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33113.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33113", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:12.000", - "lastModified": "2024-01-09T19:22:25.130", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:29.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33114.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33114.json index 8bce3f63e83..31310e864c0 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33114.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33114.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33114", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:12.197", - "lastModified": "2024-01-08T18:48:14.563", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:30.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33116.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33116.json index 13c40a6a38c..855a2fbc059 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33116.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33116.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33116", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:12.377", - "lastModified": "2024-01-08T18:49:48.687", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:30.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33117.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33117.json index d3b9ba69562..f0a96add3e4 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33117.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33117.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33117", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:12.580", - "lastModified": "2024-01-08T18:50:40.583", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:30.493", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ @@ -140,9 +150,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" } ] }, @@ -151,9 +161,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", - "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" } ] } @@ -162,17 +172,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" - } - ] - }, { "operator": "OR", "negate": false, @@ -183,23 +182,23 @@ "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -210,23 +209,23 @@ "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -237,23 +236,23 @@ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -264,23 +263,23 @@ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -291,23 +290,23 @@ "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -318,23 +317,23 @@ "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -345,23 +344,23 @@ "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -372,23 +371,23 @@ "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -399,23 +398,23 @@ "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -426,6 +425,17 @@ "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] } ] }, @@ -437,9 +447,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" } ] }, @@ -448,9 +458,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" } ] } @@ -1409,9 +1419,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25" } ] }, @@ -1420,9 +1430,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" } ] } diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33118.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33118.json index 8af5fa2aad7..f27d3ad5079 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33118.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33118.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33118", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:12.780", - "lastModified": "2024-01-08T18:56:00.013", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:30.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33120.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33120.json index ebf0f3a9fbb..d805d0d1f82 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33120.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33120.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33120", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:12.957", - "lastModified": "2024-01-09T19:22:36.173", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:30.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43511.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43511.json index 466ba6eabe2..ae32f269f70 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43511.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43511.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43511", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:13.150", - "lastModified": "2024-01-08T18:56:39.467", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:31.280", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-835" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] } ], "configurations": [ @@ -79,9 +89,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" } ] }, @@ -90,9 +100,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" } ] } @@ -101,17 +111,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:9206_lte_modem_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E2C2632A-02F2-4C59-AF96-E2C77940360F" - } - ] - }, { "operator": "OR", "negate": false, @@ -122,23 +121,23 @@ "matchCriteriaId": "D10A104D-951A-4FA9-938A-1324640A998D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6FEDA6CA-A0FD-4A72-B856-C8E65AC86902" + "criteria": "cpe:2.3:o:qualcomm:9206_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2C2632A-02F2-4C59-AF96-E2C77940360F" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -149,23 +148,23 @@ "matchCriteriaId": "8D29295A-7183-46BE-B4EE-F891D1C17ED9" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CDCB8499-A096-4633-8506-63C0A227A958" + "criteria": "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEDA6CA-A0FD-4A72-B856-C8E65AC86902" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -176,23 +175,23 @@ "matchCriteriaId": "BEE2C7C3-E928-4466-B537-0D1826E2223C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:apq8092_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CF8D0C2A-3444-45EA-81BC-F72BE9D2F0FF" + "criteria": "cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDCB8499-A096-4633-8506-63C0A227A958" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -203,23 +202,23 @@ "matchCriteriaId": "B678CB4A-A4B4-45AF-9218-AFC30A5B71ED" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:apq8094_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "83BCBAD4-F51F-43E8-8865-C07B47EA6417" + "criteria": "cpe:2.3:o:qualcomm:apq8092_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF8D0C2A-3444-45EA-81BC-F72BE9D2F0FF" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -230,23 +229,23 @@ "matchCriteriaId": "20239319-ACA6-4249-815D-C10D5E39A16A" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + "criteria": "cpe:2.3:o:qualcomm:apq8094_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83BCBAD4-F51F-43E8-8865-C07B47EA6417" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -257,6 +256,17 @@ "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + } + ] } ] }, @@ -268,9 +278,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" } ] }, @@ -279,9 +289,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" } ] } @@ -592,9 +602,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324" } ] }, @@ -603,9 +613,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" } ] } @@ -1051,9 +1061,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "06126F30-D081-4A11-92FB-4074A451FAF9" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2550040-CCC7-4B52-8D3E-7948B3E3C62B" } ] }, @@ -1062,9 +1072,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E2550040-CCC7-4B52-8D3E-7948B3E3C62B" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06126F30-D081-4A11-92FB-4074A451FAF9" } ] } diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43512.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43512.json index cff22654667..7007ff9ec0e 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43512.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43512.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43512", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:13.390", - "lastModified": "2024-01-08T18:58:42.300", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:31.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43513.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43513.json index 9c16db018f7..a1b9557449d 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43513.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43513.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43513", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:01.127", - "lastModified": "2024-02-09T00:49:48.173", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:31.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43514.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43514.json index 23a6ffb233c..ec86058266e 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43514.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43514.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43514", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-01-02T06:15:13.557", - "lastModified": "2024-01-08T18:59:13.010", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:32.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-416" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43516.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43516.json index 313324c5d95..4625f9a1dae 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43516.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43516.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43516", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:01.307", - "lastModified": "2024-02-09T00:50:24.280", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:32.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43517.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43517.json index a3bc51481fe..be2ff9258f4 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43517.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43517.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43517", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:01.467", - "lastModified": "2024-02-09T00:51:20.140", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:32.747", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43518.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43518.json index fe884d7e63a..2d72383d801 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43518.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43518.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43518", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:01.630", - "lastModified": "2024-02-09T00:51:42.733", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:32.877", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] } ], "configurations": [ @@ -160,9 +170,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" } ] }, @@ -171,9 +181,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" } ] } @@ -182,17 +192,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" - } - ] - }, { "operator": "OR", "negate": false, @@ -203,23 +202,23 @@ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -230,23 +229,23 @@ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -257,23 +256,23 @@ "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -284,23 +283,23 @@ "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -311,23 +310,23 @@ "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2" + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -338,6 +337,17 @@ "matchCriteriaId": "5B0F8ED6-EAE7-44EA-A8C6-F5AD408261F0" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2" + } + ] } ] }, @@ -349,9 +359,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "886CF046-E1D9-4FD4-AC02-EAB61C3F70FD" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "059486E9-3F99-4C65-A763-470564EDAF2C" } ] }, @@ -360,9 +370,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*", - "matchCriteriaId": "059486E9-3F99-4C65-A763-470564EDAF2C" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886CF046-E1D9-4FD4-AC02-EAB61C3F70FD" } ] } diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43519.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43519.json index bae971aa6c1..a687419b2b3 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43519.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43519.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43519", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:01.813", - "lastModified": "2024-02-08T22:08:33.677", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:33.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43520.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43520.json index 67be1aedfe5..73097b6d776 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43520.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43520.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43520", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:01.980", - "lastModified": "2024-02-08T22:00:42.790", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:33.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-787" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43522.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43522.json index fff2b1b3b78..463ad4eac22 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43522.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43522.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43522", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:02.150", - "lastModified": "2024-02-08T21:59:52.547", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:33.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "CWE-476" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43523.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43523.json index 47aca7cd1b2..5d7bc058b85 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43523.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43523.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43523", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:02.330", - "lastModified": "2024-02-09T00:52:17.807", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:34.243", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "CWE-617" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43532.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43532.json index 1c724dee71b..f1d23b47ab3 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43532.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43532.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43532", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:02.500", - "lastModified": "2024-02-08T21:19:44.773", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:34.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-763" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43533.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43533.json index 5168c0fe411..8104ecf075e 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43533.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43533.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43533", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:02.670", - "lastModified": "2024-02-08T21:17:59.437", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:34.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "CWE-125" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43534.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43534.json index f32623e26a0..de2974b7a9a 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43534.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43534.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43534", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:02.850", - "lastModified": "2024-02-08T21:17:05.153", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:35.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-119" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43535.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43535.json index 44b37444847..1061eef0657 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43535.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43535.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43535", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:03.013", - "lastModified": "2024-02-08T21:11:41.007", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:35.560", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "CWE-129" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43536.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43536.json index bb93292fa69..6dc4e55e6bd 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43536.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43536.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43536", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:16:03.177", - "lastModified": "2024-02-08T21:09:43.057", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-12T16:15:35.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "configurations": [ @@ -464,9 +474,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:immersive_home_214_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4C241123-63B1-4CA2-A3CB-BADA86EAAA2E" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_214_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66E4B95D-966A-4940-A403-9E8241F121C2" } ] }, @@ -475,9 +485,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:immersive_home_214_platform:-:*:*:*:*:*:*:*", - "matchCriteriaId": "66E4B95D-966A-4940-A403-9E8241F121C2" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_214_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C241123-63B1-4CA2-A3CB-BADA86EAAA2E" } ] } @@ -486,17 +496,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:immersive_home_216_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "68309F58-91D9-407E-9578-17EAF6836E07" - } - ] - }, { "operator": "OR", "negate": false, @@ -507,23 +506,23 @@ "matchCriteriaId": "A0D491A9-6A1F-4B62-9A30-5A9F592BD5B5" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:immersive_home_316_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AA6CA3E5-7A0F-4705-985E-0C25DE609494" + "criteria": "cpe:2.3:o:qualcomm:immersive_home_216_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68309F58-91D9-407E-9578-17EAF6836E07" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -534,23 +533,23 @@ "matchCriteriaId": "8DC770BF-4B23-4F43-A0B9-E5FE41536F5E" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:immersive_home_318_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "84B4531C-9D90-4A9B-8724-1428372319C8" + "criteria": "cpe:2.3:o:qualcomm:immersive_home_316_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA6CA3E5-7A0F-4705-985E-0C25DE609494" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -561,23 +560,23 @@ "matchCriteriaId": "497EC79B-0879-4FA2-A5B7-63EA54FC20A5" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B1AA3313-749F-486B-8212-33E569377C2B" + "criteria": "cpe:2.3:o:qualcomm:immersive_home_318_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84B4531C-9D90-4A9B-8724-1428372319C8" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -588,23 +587,23 @@ "matchCriteriaId": "B6F6D44F-BD86-44B9-BE5D-471D33F0438D" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7BB0662A-2D27-4AE7-8370-0B567B9A8214" + "criteria": "cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1AA3313-749F-486B-8212-33E569377C2B" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -615,23 +614,23 @@ "matchCriteriaId": "67970B89-2F06-4E4A-88CA-9D37C060C1BA" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq4018_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1D65E62B-95CA-4229-A61B-F4FB70466B6E" + "criteria": "cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BB0662A-2D27-4AE7-8370-0B567B9A8214" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -642,23 +641,23 @@ "matchCriteriaId": "1339CEEF-34C9-426E-864B-6C7B68E72CAA" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq4028_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3525CD2A-CE43-4B42-B8C2-9B19B2551214" + "criteria": "cpe:2.3:o:qualcomm:ipq4018_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D65E62B-95CA-4229-A61B-F4FB70466B6E" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -669,23 +668,23 @@ "matchCriteriaId": "010DBDB1-F1A3-4805-BDD2-84CBFA0A0BE1" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq4029_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3D21F293-B9C7-46CB-8D83-BEE27E899BC3" + "criteria": "cpe:2.3:o:qualcomm:ipq4028_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3525CD2A-CE43-4B42-B8C2-9B19B2551214" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -696,23 +695,23 @@ "matchCriteriaId": "C4BA4D00-D7B2-4152-BD82-E6F572655AF3" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8543C671-054B-489F-ACFE-B7D7BEC1DEE6" + "criteria": "cpe:2.3:o:qualcomm:ipq4029_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D21F293-B9C7-46CB-8D83-BEE27E899BC3" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -723,23 +722,23 @@ "matchCriteriaId": "15C5F8CB-3291-4E13-94F0-680FC85A9669" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq5302_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3EB5FF59-057F-42D9-8829-EF0AD2CBB6DD" + "criteria": "cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8543C671-054B-489F-ACFE-B7D7BEC1DEE6" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -750,6 +749,17 @@ "matchCriteriaId": "AE256F7A-9696-44D0-B8C9-C60A7B61FC91" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq5302_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3EB5FF59-057F-42D9-8829-EF0AD2CBB6DD" + } + ] } ] }, @@ -761,9 +771,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:qualcomm:ipq5312_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "01F79573-A728-4052-92A6-5ADE4E7A4B23" + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq5312:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AA3AFC1-C1A8-46F4-9AE9-053AB9E56B0D" } ] }, @@ -772,9 +782,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:qualcomm:ipq5312:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1AA3AFC1-C1A8-46F4-9AE9-053AB9E56B0D" + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq5312_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01F79573-A728-4052-92A6-5ADE4E7A4B23" } ] } diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0157.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0157.json new file mode 100644 index 00000000000..b3095cfe5c9 --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0157.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-0157", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-04-12T17:17:21.027", + "lastModified": "2024-04-12T17:17:21.027", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Dell Storage Resource Manager, 4.9.0.0 and below, contain(s) a Session Fixation Vulnerability in SRM Windows Host Agent. An adjacent network unauthenticated attacker could potentially exploit this vulnerability, leading to the hijack of a targeted user's application session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-nz/000224070/dsa-2024-143-dell-storage-resource-manager-srm-and-dell-storage-monitoring-and-reporting-smr-security-update-for-multiple-third-party-component-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22334.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22334.json new file mode 100644 index 00000000000..6d9e15c3a83 --- /dev/null +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22334.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22334", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-04-12T17:17:21.300", + "lastModified": "2024-04-12T17:17:21.300", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.20, 7.1 through 7.1.2.16, 7.2 through 7.2.3.9, 7.3 through 7.3.2.4 and IBM DevOps Deploy 8.0 through 8.0.0.1 could be vulnerable to incomplete revocation of permissions when deleting a custom security resource type. When deleting a custom security type, associated permissions of objects using that type may not be fully revoked. This could lead to incorrect reporting of permission configuration and unexpected privileges being retained. IBM X-Force ID: 279974." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279974", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7148112", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22339.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22339.json new file mode 100644 index 00000000000..709a3f1bb82 --- /dev/null +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22339.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22339", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-04-12T17:17:21.647", + "lastModified": "2024-04-12T17:17:21.647", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.20, 7.1 through 7.1.2.16, 7.2 through 7.2.3.9, 7.3 through 7.3.2.4 and IBM DevOps Deploy 8.0 through 8.0.0.1 is vulnerable to a sensitive information due to insufficient obfuscation of sensitive values from some log files. IBM X-Force ID: 279979." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279979", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7148113", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22358.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22358.json new file mode 100644 index 00000000000..47d6de50599 --- /dev/null +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22358.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22358", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-04-12T17:17:22.023", + "lastModified": "2024-04-12T17:17:22.023", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.20, 7.1 through 7.1.2.16, 7.2 through 7.2.3.9, 7.3 through 7.3.2.4 and IBM DevOps Deploy 8.0 through 8.0.0.1 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 280896." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280896", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7148109", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22359.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22359.json new file mode 100644 index 00000000000..37610a0e5c9 --- /dev/null +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22359.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22359", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-04-12T17:17:22.373", + "lastModified": "2024-04-12T17:17:22.373", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.20, 7.1 through 7.1.2.16, 7.2 through 7.2.3.9, 7.3 through 7.3.2.4 and IBM DevOps Deploy 8.0 through 8.0.0.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 280897." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280897", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7148111", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28878.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28878.json new file mode 100644 index 00000000000..dd82287f5dd --- /dev/null +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28878.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28878", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-04-12T16:15:36.647", + "lastModified": "2024-04-12T16:15:36.647", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nIO-1020 Micro ELD downloads source code or an executable from an \nadjacent location and executes the code without sufficiently verifying \nthe origin or integrity of the code.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-093-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30210.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30210.json new file mode 100644 index 00000000000..354d0de59f5 --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30210.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30210", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-04-12T16:15:36.987", + "lastModified": "2024-04-12T16:15:36.987", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IO-1020 Micro ELD uses a default WIFI password that could allow an adjacent attacker to connect to the device.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1392" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-093-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30382.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30382.json new file mode 100644 index 00000000000..ea334f20261 --- /dev/null +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30382.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30382", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-04-12T16:15:37.207", + "lastModified": "2024-04-12T16:15:37.207", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to send a specific routing update, causing an rpd core due to memory corruption, leading to a Denial of Service (DoS).\n\nThis issue can only be triggered when the system is configured for CoS-based forwarding (CBF) with a policy map containing a cos-next-hop-map action (see below).\nThis issue affects:\nJunos OS: \n\n\n * all versions before 20.4R3-S10, \n * from 21.2 before 21.2R3-S8,\n * from 21.3 before 21.3R3, \n * from 21.4 before 21.4R3, \n * from 22.1 before 22.1R2;\n\n\n\n\nJunos OS Evolved: \n\n\n * all versions before 21.2R3-S8-EVO,\n * from 21.3 before 21.3R3-EVO, \n * from 21.4 before 21.4R3-EVO, \n * from 22.1 before 22.1R2-EVO.\n\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA79174", + "source": "sirt@juniper.net" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30384.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30384.json new file mode 100644 index 00000000000..5599670a437 --- /dev/null +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30384.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30384", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-04-12T16:15:37.440", + "lastModified": "2024-04-12T16:15:37.440", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on EX4300 Series allows a locally authenticated attacker with low privileges to cause a\u00a0Denial-of-Service (Dos).\n\nIf a specific CLI\u00a0command is issued, a\u00a0PFE crash will occur. This will cause traffic forwarding to be interrupted until the system self-recovers.\u00a0\n\nThis issue affects Junos OS:\u00a0\n\nAll versions before 20.4R3-S10,\n\n21.2 versions before 21.2R3-S7,\n\n21.4 versions before 21.4R3-S6.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "http://supportportal.juniper.net/JSA79186", + "source": "sirt@juniper.net" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30386.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30386.json new file mode 100644 index 00000000000..15f98ebdcb3 --- /dev/null +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30386.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30386", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-04-12T16:15:37.650", + "lastModified": "2024-04-12T16:15:37.650", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A Use-After-Free vulnerability in the\u00a0Layer 2 Address Learning Daemon (l2ald)\n\n of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause l2ald to crash leading to a Denial-of-Service (DoS).\n\nIn an EVPN-VXLAN scenario,\u00a0when \n\nstate updates are received and processed by the affected system, the correct order of some processing steps is not ensured, which can lead to an l2ald crash and restart. Whether the crash occurs depends on system internal timing which is outside the attackers control.\nThis issue affects:\n\nJunos OS:\u00a0\n\n\n\n * All versions before 20.4R3-S8,\n * 21.2 versions before 21.2R3-S6,\n * 21.3 versions before 21.3R3-S5,\n * 21.4 versions before 21.4R3-S4,\n * 22.1 versions before 22.1R3-S3,\n * 22.2 versions before 22.2R3-S1,\n * 22.3 versions before 22.3R3,,\n * 22.4 versions before 22.4R2;\n\n\n\n\nJunos OS Evolved:\u00a0\n\n\n\n * All versions before 20.4R3-S8-EVO,\n * 21.2-EVO versions before 21.2R3-S6-EVO,\u00a0\n * 21.3-EVO\n\n versions before 21.3R3-S5-EVO,\n * 21.4-EVO\n\n versions before 21.4R3-S4-EVO,\n * 22.1-EVO\n\n versions before 22.1R3-S3-EVO,\n * 22.2-EVO\n\n versions before 22.2R3-S1-EVO,\n * 22.3-EVO\n\n versions before 22.3R3-EVO,\n * 22.4-EVO\n\n versions before 22.4R2-EVO.\n\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "http://supportportal.juniper.net/JSA79184", + "source": "sirt@juniper.net" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30387.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30387.json new file mode 100644 index 00000000000..3de75c99d63 --- /dev/null +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30387.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30387", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-04-12T16:15:37.867", + "lastModified": "2024-04-12T16:15:37.867", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A\u00a0Missing Synchronization vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on ACX5448 and ACX710 allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS).\n\nIf an interface flaps while the system gathers statistics on that interface, two processes simultaneously access a shared resource which leads to a PFE crash and restart.\n\nThis issue affects Junos OS:\n\nAll versions before 20.4R3-S9,\n\n21.2 versions before 21.2R3-S5,\u00a0\n\n21.3 versions before 21.3R3-S5,\u00a0\n\n21.4 versions before 21.4R3-S4,\n\n22.1 versions before 22.1R3-S2,\n\n22.2 versions before 22.2R3-S2,\n\n22.3 versions before 22.3R2-S2, 22.3R3,\n\n22.4 versions before 22.4R2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-820" + } + ] + } + ], + "references": [ + { + "url": "http://supportportal.juniper.net/JSA79187", + "source": "sirt@juniper.net" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30388.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30388.json new file mode 100644 index 00000000000..f478162fd44 --- /dev/null +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30388.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30388", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-04-12T16:15:38.093", + "lastModified": "2024-04-12T16:15:38.093", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An Improper Isolation or Compartmentalization vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on QFX5000 Series and EX Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).\n\nIf a specific malformed LACP packet is received by a QFX5000 Series, or an EX4400, EX4100 or EX4650 Series device, an LACP flap will occur resulting in traffic loss.\nThis issue affects Junos OS on QFX5000 Series, and on EX4400, EX4100 or EX4650 Series:\n\n\n\n * 20.4 versions from \n\n20.4R3-S4\n\nbefore 20.4R3-S8,\n * 21.2 versions from \n\n21.2R3-S2\n\nbefore 21.2R3-S6,\n * 21.4 versions from \n\n21.4R2\n\nbefore 21.4R3-S4,\n\n * 22.1 versions from\n\n22.1R2\n\n before 22.1R3-S3,\n * 22.2 versions before 22.2R3-S1,\n * 22.3 versions before 22.3R2-S2, 22.3R3,\n * 22.4 versions before 22.4R2-S1, 22.4R3.\n\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-653" + } + ] + } + ], + "references": [ + { + "url": "http://supportportal.juniper.net/JSA79089", + "source": "sirt@juniper.net" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30389.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30389.json new file mode 100644 index 00000000000..197cb6c7a46 --- /dev/null +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30389.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30389", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-04-12T16:15:38.317", + "lastModified": "2024-04-12T16:15:38.317", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An Incorrect Behavior Order vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on EX4300 Series allows an unauthenticated, network-based attacker to cause an integrity impact to networks downstream of the vulnerable device.\n\nWhen an output firewall filter is applied to an interface it doesn't recognize matching packets but permits any traffic.\nThis issue affects Junos OS 21.4 releases from 21.4R1 earlier than 21.4R3-S6.\nThis issue does not affect Junos OS releases earlier than 21.4R1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-696" + } + ] + } + ], + "references": [ + { + "url": "http://supportportal.juniper.net/JSA79185", + "source": "sirt@juniper.net" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30390.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30390.json new file mode 100644 index 00000000000..5136270c848 --- /dev/null +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30390.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30390", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-04-12T16:15:38.540", + "lastModified": "2024-04-12T16:15:38.540", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a limited\u00a0Denial of Service (DoS) to the management plane.\n\nWhen an incoming connection was blocked because it exceeded the connections-per-second rate-limit, the system doesn't consider existing connections anymore for subsequent connection attempts so that the connection\u00a0limit can be exceeded.\nThis issue affects Junos OS Evolved:\n\nAll versions before 21.4R3-S4-EVO,\n\n22.1-EVO versions before 22.1R3-S3-EVO,\n\n22.2-EVO versions before 22.2R3-S2-EVO,\u00a0\n\n22.3-EVO versions before 22.3R2-S1-EVO, 22.3R3-EVO.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "references": [ + { + "url": "http://supportportal.juniper.net/JSA79183", + "source": "sirt@juniper.net" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30391.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30391.json new file mode 100644 index 00000000000..c00c4a5bede --- /dev/null +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30391.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30391", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-04-12T16:15:38.773", + "lastModified": "2024-04-12T16:15:38.773", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A Missing Authentication for Critical Function vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series with SPC3, and\u00a0SRX Series\u00a0allows an unauthenticated network-based attacker to cause limited impact to the integrity or availability of the device.\n\nIf a device is configured with IPsec authentication algorithm hmac-sha-384 or hmac-sha-512, tunnels are established normally but for traffic traversing the tunnel no authentication information is sent with the encrypted data on egress, and no authentication information is expected on ingress. So if the peer is an unaffected device transit traffic is going to fail in both directions. If the peer is an also affected device transit traffic works, but without authentication, and configuration and CLI operational commands indicate authentication is performed.\nThis issue affects Junos OS:\n\nAll versions before 20.4R3-S7,\n\n21.1 versions before 21.1R3,\u00a0\n\n21.2 versions before 21.2R2-S1, 21.2R3,\u00a0\n\n21.3 versions before 21.3R1-S2, 21.3R2.\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "http://supportportal.juniper.net/JSA79188", + "source": "sirt@juniper.net" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30392.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30392.json new file mode 100644 index 00000000000..a69c6e96dc8 --- /dev/null +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30392.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30392", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-04-12T16:15:39.040", + "lastModified": "2024-04-12T16:15:39.040", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A Stack-based Buffer Overflow vulnerability in Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS).\n\nOn all Junos OS MX Series platforms with SPC3 and MS-MPC/-MIC, when URL filtering is enabled and a specific URL request is received and processed, flowd will crash and restart. Continuous reception of the specific URL request will lead to a sustained Denial of Service (DoS) condition.\n\nThis issue affects:\nJunos OS:\n\n\n\n * all versions before 21.2R3-S6,\n\n * from 21.3 before 21.3R3-S5,\n\n * from 21.4 before 21.4R3-S5,\n\n * from 22.1 before 22.1R3-S3,\n\n * from 22.2 before 22.2R3-S1,\n\n * from 22.3 before 22.3R2-S2, 22.3R3,\n\n * from 22.4 before 22.4R2-S1, 22.4R3.\n\n\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA79092", + "source": "sirt@juniper.net" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30397.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30397.json new file mode 100644 index 00000000000..d9b78a82a7d --- /dev/null +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30397.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30397", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-04-12T16:15:39.267", + "lastModified": "2024-04-12T16:15:39.267", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the the\u00a0Public Key Infrastructure daemon (pkid) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause Denial of Service (DoS).\n\nThe pkid is responsible for the certificate verification. Upon a failed verification, the pkid uses all CPU resources and becomes unresponsive to future verification attempts. This means that all subsequent VPN negotiations depending on certificate verification will fail.\n\nThis CPU utilization of pkid can be checked using this command: \n\u00a0 root@srx> show system processes extensive | match pkid\n\u00a0 xxxxx \u2003root \u2003103\u2003 0 \u2003846M \u2003136M \u2003CPU1 \u20031\u00a0569:00 100.00% pkid\n\nThis issue affects:\nJuniper Networks Junos OS\nAll\u00a0versions prior to 20.4R3-S10;\n21.2 versions prior to 21.2R3-S7;\n21.4 versions prior to 21.4R3-S5;\n22.1 versions prior to 22.1R3-S4;\n22.2 versions prior to\u00a022.2R3-S3;\n22.3 versions prior to\u00a022.3R3-S1;\n22.4 versions prior to\u00a022.4R3;\n23.2 versions prior to\u00a023.2R1-S2, 23.2R2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA79179", + "source": "sirt@juniper.net" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30398.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30398.json new file mode 100644 index 00000000000..6489796c232 --- /dev/null +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30398.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30398", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-04-12T16:15:39.497", + "lastModified": "2024-04-12T16:15:39.497", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).\n\nWhen a high amount of specific traffic is received on a SRX4600 device, due to an error in internal packet handling, a consistent rise in CPU memory utilization occurs. This results in packet drops in the traffic and eventually the PFE crashes. A manual reboot of the PFE will be required to restore the device to original state.\n\nThis issue affects Junos OS:\u00a0\u00a0\n21.2 before\u00a021.2R3-S7,\n21.4 before 21.4R3-S6,\u00a0\n22.1 before 22.1R3-S5, \n22.2 before 22.2R3-S3,\n22.3 before 22.3R3-S2,\n22.4 before 22.4R3,\n23.2 before\u00a023.2R1-S2, 23.2R2.\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA79176", + "source": "sirt@juniper.net" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30401.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30401.json new file mode 100644 index 00000000000..a37390720c1 --- /dev/null +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30401.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30401", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-04-12T16:15:39.713", + "lastModified": "2024-04-12T16:15:39.713", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An Out-of-bounds Read vulnerability in the advanced forwarding management process aftman of Juniper Networks Junos OS on MX Series with MPC10E, MPC11, MX10K-LC9600 line cards, MX304, and EX9200-15C, may allow an attacker to exploit a stack-based buffer overflow, leading to a reboot of the FPC.\n\nThrough code review, it was determined that the interface definition code for aftman could read beyond a buffer boundary, leading to a stack-based buffer overflow.\nThis issue affects Junos OS on MX Series and EX9200-15C:\n\n\n * from 21.2 before 21.2R3-S1, \n * from 21.4 before 21.4R3, \n * from 22.1 before 22.1R2, \n * from 22.2 before 22.2R2;\u00a0\n\n\n\n\nThis issue does not affect:\n\n\n\n * versions of Junos OS prior to\u00a020.3R1;\n * any version of Junos OS 20.4.\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA79110", + "source": "sirt@juniper.net" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30402.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30402.json new file mode 100644 index 00000000000..53414b9c236 --- /dev/null +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30402.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30402", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-04-12T16:15:39.930", + "lastModified": "2024-04-12T16:15:39.930", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon\u00a0(l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).\n\nWhen telemetry requests are sent to the device,\u00a0and the Dynamic Rendering Daemon (drend) is suspended, the l2ald crashes and restarts due to factors outside the attackers control. Repeated occurrences of these events causes a sustained DoS condition.\n\n\nThis issue affects:\nJunos OS:\nAll versions earlier than\u00a020.4R3-S10;\n21.2 versions earlier than\u00a021.2R3-S7;\n21.4 versions earlier than\u00a021.4R3-S5;\n22.1 versions earlier than\u00a022.1R3-S4;\n22.2 versions earlier than\u00a022.2R3-S3;\n22.3 versions earlier than\u00a022.3R3-S1;\n22.4 versions earlier than\u00a022.4R3;\n23.2 versions earlier than\u00a023.2R1-S2, 23.2R2.\n\nJunos OS Evolved:\n\nAll versions earlier than\u00a021.4R3-S5-EVO;\n22.1-EVO versions earlier than\u00a022.1R3-S4-EVO;\n22.2-EVO versions earlier than\u00a022.2R3-S3-EVO;\n22.3-EVO versions earlier than\u00a022.3R3-S1-EVO;\n22.4-EVO versions earlier than\u00a022.4R3-EVO;\n23.2-EVO versions earlier than\u00a023.2R2-EVO.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA79180", + "source": "sirt@juniper.net" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30403.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30403.json new file mode 100644 index 00000000000..9a17eccb94d --- /dev/null +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30403.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-30403", + "sourceIdentifier": "sirt@juniper.net", + "published": "2024-04-12T16:15:40.123", + "lastModified": "2024-04-12T16:15:40.123", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).\n\nWhen Layer 2 traffic is sent through a logical interface, MAC learning happens. If during this process, the interface flaps,\u00a0an\u00a0Advanced Forwarding Toolkit manager (evo-aftmand-bt) core is observed. This leads to a PFE restart. The crash reoccurs if the same sequence of events happens, which will lead to a sustained DoS condition.\n\nThis issue affects Juniper Networks Junos OS Evolved:\n23.2-EVO versions earlier than 23.2R1-S1-EVO, 23.2R2-EVO. \n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA79181", + "source": "sirt@juniper.net" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31069.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31069.json new file mode 100644 index 00000000000..706bc0a9e2a --- /dev/null +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31069.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31069", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-04-12T16:15:40.303", + "lastModified": "2024-04-12T16:15:40.303", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IO-1020 Micro ELD web server uses a default password for authentication.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1392" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-093-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3400.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3400.json index 185da370e69..f62f44497b4 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3400.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3400.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3400", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-04-12T08:15:06.230", - "lastModified": "2024-04-12T12:43:46.210", + "lastModified": "2024-04-12T17:17:22.740", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -17,20 +17,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, + "baseScore": 10.0, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, - "impactScore": 5.9 + "impactScore": 6.0 } ] }, diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3691.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3691.json new file mode 100644 index 00000000000..ec2413adcad --- /dev/null +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3691.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3691", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-04-12T16:15:40.480", + "lastModified": "2024-04-12T16:15:40.480", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Small CRM 3.0. Affected by this issue is some unknown functionality of the component Registration Page. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-260480." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/nikhil-aniill/Small-CRM-CVE", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.260480", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.260480", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.312975", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3695.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3695.json new file mode 100644 index 00000000000..21c177b7631 --- /dev/null +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3695.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3695", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-04-12T16:15:40.707", + "lastModified": "2024-04-12T16:15:40.707", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in SourceCodester Computer Laboratory Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /classes/Users.php. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-260482 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Computer%20Laboratory%20Management%20System%20using%20PHP%20and%20MySQL%20-%20vuln%202.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.260482", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.260482", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.314071", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3696.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3696.json new file mode 100644 index 00000000000..35f99bd3991 --- /dev/null +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3696.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3696", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-04-12T16:15:40.943", + "lastModified": "2024-04-12T16:15:40.943", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes House Rental Management System 1.0 and classified as critical. This issue affects some unknown processing of the file view_payment.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-260483." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20vuln%201.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.260483", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.260483", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.314199", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3697.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3697.json new file mode 100644 index 00000000000..08b4545512d --- /dev/null +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3697.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3697", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-04-12T17:17:22.983", + "lastModified": "2024-04-12T17:17:22.983", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes House Rental Management System 1.0. It has been classified as critical. Affected is an unknown function of the file manage_tenant.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-260484." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20vuln%203.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.260484", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.260484", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.314203", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3698.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3698.json new file mode 100644 index 00000000000..5855210bb5a --- /dev/null +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3698.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3698", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-04-12T17:17:23.337", + "lastModified": "2024-04-12T17:17:23.337", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes House Rental Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file manage_payment.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260485 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20vuln%204.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.260485", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.260485", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.314204", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ec0b74a3406..7d955a5e1dd 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-04-12T16:00:38.248065+00:00 +2024-04-12T18:01:15.416624+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-04-12T15:15:26.473000+00:00 +2024-04-12T17:17:23.337000+00:00 ``` ### Last Data Feed Release @@ -33,66 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -245364 +245391 ``` ### CVEs added in the last Commit -Recently added CVEs: `34` +Recently added CVEs: `27` -- [CVE-2024-21610](CVE-2024/CVE-2024-216xx/CVE-2024-21610.json) (`2024-04-12T15:15:23.950`) -- [CVE-2024-21615](CVE-2024/CVE-2024-216xx/CVE-2024-21615.json) (`2024-04-12T15:15:24.153`) -- [CVE-2024-21618](CVE-2024/CVE-2024-216xx/CVE-2024-21618.json) (`2024-04-12T15:15:24.350`) -- [CVE-2024-2397](CVE-2024/CVE-2024-23xx/CVE-2024-2397.json) (`2024-04-12T14:15:07.657`) -- [CVE-2024-29461](CVE-2024/CVE-2024-294xx/CVE-2024-29461.json) (`2024-04-12T14:15:07.597`) -- [CVE-2024-30381](CVE-2024/CVE-2024-303xx/CVE-2024-30381.json) (`2024-04-12T15:15:24.547`) -- [CVE-2024-30394](CVE-2024/CVE-2024-303xx/CVE-2024-30394.json) (`2024-04-12T15:15:24.730`) -- [CVE-2024-30395](CVE-2024/CVE-2024-303xx/CVE-2024-30395.json) (`2024-04-12T15:15:24.930`) -- [CVE-2024-30405](CVE-2024/CVE-2024-304xx/CVE-2024-30405.json) (`2024-04-12T15:15:25.133`) -- [CVE-2024-30406](CVE-2024/CVE-2024-304xx/CVE-2024-30406.json) (`2024-04-12T15:15:25.340`) -- [CVE-2024-30407](CVE-2024/CVE-2024-304xx/CVE-2024-30407.json) (`2024-04-12T15:15:25.540`) -- [CVE-2024-30409](CVE-2024/CVE-2024-304xx/CVE-2024-30409.json) (`2024-04-12T15:15:25.740`) -- [CVE-2024-30410](CVE-2024/CVE-2024-304xx/CVE-2024-30410.json) (`2024-04-12T15:15:25.940`) -- [CVE-2024-30845](CVE-2024/CVE-2024-308xx/CVE-2024-30845.json) (`2024-04-12T14:15:07.870`) -- [CVE-2024-31391](CVE-2024/CVE-2024-313xx/CVE-2024-31391.json) (`2024-04-12T15:15:26.157`) -- [CVE-2024-31839](CVE-2024/CVE-2024-318xx/CVE-2024-31839.json) (`2024-04-12T14:15:07.947`) -- [CVE-2024-3686](CVE-2024/CVE-2024-36xx/CVE-2024-3686.json) (`2024-04-12T14:15:08.003`) -- [CVE-2024-3687](CVE-2024/CVE-2024-36xx/CVE-2024-3687.json) (`2024-04-12T14:15:08.250`) -- [CVE-2024-3688](CVE-2024/CVE-2024-36xx/CVE-2024-3688.json) (`2024-04-12T14:15:08.513`) -- [CVE-2024-3689](CVE-2024/CVE-2024-36xx/CVE-2024-3689.json) (`2024-04-12T15:15:26.257`) -- [CVE-2024-3690](CVE-2024/CVE-2024-36xx/CVE-2024-3690.json) (`2024-04-12T15:15:26.473`) -- [CVE-2024-3704](CVE-2024/CVE-2024-37xx/CVE-2024-3704.json) (`2024-04-12T14:15:08.743`) -- [CVE-2024-3705](CVE-2024/CVE-2024-37xx/CVE-2024-3705.json) (`2024-04-12T14:15:08.957`) -- [CVE-2024-3706](CVE-2024/CVE-2024-37xx/CVE-2024-3706.json) (`2024-04-12T14:15:09.160`) -- [CVE-2024-3707](CVE-2024/CVE-2024-37xx/CVE-2024-3707.json) (`2024-04-12T14:15:09.383`) +- [CVE-2024-22339](CVE-2024/CVE-2024-223xx/CVE-2024-22339.json) (`2024-04-12T17:17:21.647`) +- [CVE-2024-22358](CVE-2024/CVE-2024-223xx/CVE-2024-22358.json) (`2024-04-12T17:17:22.023`) +- [CVE-2024-22359](CVE-2024/CVE-2024-223xx/CVE-2024-22359.json) (`2024-04-12T17:17:22.373`) +- [CVE-2024-28878](CVE-2024/CVE-2024-288xx/CVE-2024-28878.json) (`2024-04-12T16:15:36.647`) +- [CVE-2024-30210](CVE-2024/CVE-2024-302xx/CVE-2024-30210.json) (`2024-04-12T16:15:36.987`) +- [CVE-2024-30382](CVE-2024/CVE-2024-303xx/CVE-2024-30382.json) (`2024-04-12T16:15:37.207`) +- [CVE-2024-30384](CVE-2024/CVE-2024-303xx/CVE-2024-30384.json) (`2024-04-12T16:15:37.440`) +- [CVE-2024-30386](CVE-2024/CVE-2024-303xx/CVE-2024-30386.json) (`2024-04-12T16:15:37.650`) +- [CVE-2024-30387](CVE-2024/CVE-2024-303xx/CVE-2024-30387.json) (`2024-04-12T16:15:37.867`) +- [CVE-2024-30388](CVE-2024/CVE-2024-303xx/CVE-2024-30388.json) (`2024-04-12T16:15:38.093`) +- [CVE-2024-30389](CVE-2024/CVE-2024-303xx/CVE-2024-30389.json) (`2024-04-12T16:15:38.317`) +- [CVE-2024-30390](CVE-2024/CVE-2024-303xx/CVE-2024-30390.json) (`2024-04-12T16:15:38.540`) +- [CVE-2024-30391](CVE-2024/CVE-2024-303xx/CVE-2024-30391.json) (`2024-04-12T16:15:38.773`) +- [CVE-2024-30392](CVE-2024/CVE-2024-303xx/CVE-2024-30392.json) (`2024-04-12T16:15:39.040`) +- [CVE-2024-30397](CVE-2024/CVE-2024-303xx/CVE-2024-30397.json) (`2024-04-12T16:15:39.267`) +- [CVE-2024-30398](CVE-2024/CVE-2024-303xx/CVE-2024-30398.json) (`2024-04-12T16:15:39.497`) +- [CVE-2024-30401](CVE-2024/CVE-2024-304xx/CVE-2024-30401.json) (`2024-04-12T16:15:39.713`) +- [CVE-2024-30402](CVE-2024/CVE-2024-304xx/CVE-2024-30402.json) (`2024-04-12T16:15:39.930`) +- [CVE-2024-30403](CVE-2024/CVE-2024-304xx/CVE-2024-30403.json) (`2024-04-12T16:15:40.123`) +- [CVE-2024-31069](CVE-2024/CVE-2024-310xx/CVE-2024-31069.json) (`2024-04-12T16:15:40.303`) +- [CVE-2024-3691](CVE-2024/CVE-2024-36xx/CVE-2024-3691.json) (`2024-04-12T16:15:40.480`) +- [CVE-2024-3695](CVE-2024/CVE-2024-36xx/CVE-2024-3695.json) (`2024-04-12T16:15:40.707`) +- [CVE-2024-3696](CVE-2024/CVE-2024-36xx/CVE-2024-3696.json) (`2024-04-12T16:15:40.943`) +- [CVE-2024-3697](CVE-2024/CVE-2024-36xx/CVE-2024-3697.json) (`2024-04-12T17:17:22.983`) +- [CVE-2024-3698](CVE-2024/CVE-2024-36xx/CVE-2024-3698.json) (`2024-04-12T17:17:23.337`) ### CVEs modified in the last Commit -Recently modified CVEs: `22` +Recently modified CVEs: `338` -- [CVE-2023-28578](CVE-2023/CVE-2023-285xx/CVE-2023-28578.json) (`2024-04-12T15:15:20.100`) -- [CVE-2023-28582](CVE-2023/CVE-2023-285xx/CVE-2023-28582.json) (`2024-04-12T15:15:20.317`) -- [CVE-2023-33066](CVE-2023/CVE-2023-330xx/CVE-2023-33066.json) (`2024-04-12T15:15:20.407`) -- [CVE-2023-33078](CVE-2023/CVE-2023-330xx/CVE-2023-33078.json) (`2024-04-12T15:15:20.517`) -- [CVE-2023-33084](CVE-2023/CVE-2023-330xx/CVE-2023-33084.json) (`2024-04-12T15:15:20.613`) -- [CVE-2023-33086](CVE-2023/CVE-2023-330xx/CVE-2023-33086.json) (`2024-04-12T15:15:20.723`) -- [CVE-2023-33090](CVE-2023/CVE-2023-330xx/CVE-2023-33090.json) (`2024-04-12T15:15:20.820`) -- [CVE-2023-33095](CVE-2023/CVE-2023-330xx/CVE-2023-33095.json) (`2024-04-12T15:15:20.930`) -- [CVE-2023-33096](CVE-2023/CVE-2023-330xx/CVE-2023-33096.json) (`2024-04-12T15:15:21.037`) -- [CVE-2023-33103](CVE-2023/CVE-2023-331xx/CVE-2023-33103.json) (`2024-04-12T15:15:21.137`) -- [CVE-2023-33104](CVE-2023/CVE-2023-331xx/CVE-2023-33104.json) (`2024-04-12T15:15:21.230`) -- [CVE-2023-33105](CVE-2023/CVE-2023-331xx/CVE-2023-33105.json) (`2024-04-12T15:15:21.327`) -- [CVE-2023-43539](CVE-2023/CVE-2023-435xx/CVE-2023-43539.json) (`2024-04-12T15:15:21.433`) -- [CVE-2023-43540](CVE-2023/CVE-2023-435xx/CVE-2023-43540.json) (`2024-04-12T15:15:21.530`) -- [CVE-2023-43541](CVE-2023/CVE-2023-435xx/CVE-2023-43541.json) (`2024-04-12T15:15:21.620`) -- [CVE-2023-43546](CVE-2023/CVE-2023-435xx/CVE-2023-43546.json) (`2024-04-12T15:15:21.713`) -- [CVE-2023-43547](CVE-2023/CVE-2023-435xx/CVE-2023-43547.json) (`2024-04-12T15:15:21.810`) -- [CVE-2023-43548](CVE-2023/CVE-2023-435xx/CVE-2023-43548.json) (`2024-04-12T15:15:21.907`) -- [CVE-2023-43549](CVE-2023/CVE-2023-435xx/CVE-2023-43549.json) (`2024-04-12T15:15:22.003`) -- [CVE-2023-43550](CVE-2023/CVE-2023-435xx/CVE-2023-43550.json) (`2024-04-12T15:15:22.110`) -- [CVE-2023-43552](CVE-2023/CVE-2023-435xx/CVE-2023-43552.json) (`2024-04-12T15:15:22.210`) -- [CVE-2023-43553](CVE-2023/CVE-2023-435xx/CVE-2023-43553.json) (`2024-04-12T15:15:22.310`) +- [CVE-2023-33110](CVE-2023/CVE-2023-331xx/CVE-2023-33110.json) (`2024-04-12T16:15:29.317`) +- [CVE-2023-33112](CVE-2023/CVE-2023-331xx/CVE-2023-33112.json) (`2024-04-12T16:15:29.610`) +- [CVE-2023-33113](CVE-2023/CVE-2023-331xx/CVE-2023-33113.json) (`2024-04-12T16:15:29.843`) +- [CVE-2023-33114](CVE-2023/CVE-2023-331xx/CVE-2023-33114.json) (`2024-04-12T16:15:30.083`) +- [CVE-2023-33116](CVE-2023/CVE-2023-331xx/CVE-2023-33116.json) (`2024-04-12T16:15:30.297`) +- [CVE-2023-33117](CVE-2023/CVE-2023-331xx/CVE-2023-33117.json) (`2024-04-12T16:15:30.493`) +- [CVE-2023-33118](CVE-2023/CVE-2023-331xx/CVE-2023-33118.json) (`2024-04-12T16:15:30.713`) +- [CVE-2023-33120](CVE-2023/CVE-2023-331xx/CVE-2023-33120.json) (`2024-04-12T16:15:30.950`) +- [CVE-2023-43511](CVE-2023/CVE-2023-435xx/CVE-2023-43511.json) (`2024-04-12T16:15:31.280`) +- [CVE-2023-43512](CVE-2023/CVE-2023-435xx/CVE-2023-43512.json) (`2024-04-12T16:15:31.800`) +- [CVE-2023-43513](CVE-2023/CVE-2023-435xx/CVE-2023-43513.json) (`2024-04-12T16:15:31.983`) +- [CVE-2023-43514](CVE-2023/CVE-2023-435xx/CVE-2023-43514.json) (`2024-04-12T16:15:32.370`) +- [CVE-2023-43516](CVE-2023/CVE-2023-435xx/CVE-2023-43516.json) (`2024-04-12T16:15:32.607`) +- [CVE-2023-43517](CVE-2023/CVE-2023-435xx/CVE-2023-43517.json) (`2024-04-12T16:15:32.747`) +- [CVE-2023-43518](CVE-2023/CVE-2023-435xx/CVE-2023-43518.json) (`2024-04-12T16:15:32.877`) +- [CVE-2023-43519](CVE-2023/CVE-2023-435xx/CVE-2023-43519.json) (`2024-04-12T16:15:33.150`) +- [CVE-2023-43520](CVE-2023/CVE-2023-435xx/CVE-2023-43520.json) (`2024-04-12T16:15:33.420`) +- [CVE-2023-43522](CVE-2023/CVE-2023-435xx/CVE-2023-43522.json) (`2024-04-12T16:15:33.637`) +- [CVE-2023-43523](CVE-2023/CVE-2023-435xx/CVE-2023-43523.json) (`2024-04-12T16:15:34.243`) +- [CVE-2023-43532](CVE-2023/CVE-2023-435xx/CVE-2023-43532.json) (`2024-04-12T16:15:34.570`) +- [CVE-2023-43533](CVE-2023/CVE-2023-435xx/CVE-2023-43533.json) (`2024-04-12T16:15:34.750`) +- [CVE-2023-43534](CVE-2023/CVE-2023-435xx/CVE-2023-43534.json) (`2024-04-12T16:15:35.230`) +- [CVE-2023-43535](CVE-2023/CVE-2023-435xx/CVE-2023-43535.json) (`2024-04-12T16:15:35.560`) +- [CVE-2023-43536](CVE-2023/CVE-2023-435xx/CVE-2023-43536.json) (`2024-04-12T16:15:35.820`) +- [CVE-2024-3400](CVE-2024/CVE-2024-34xx/CVE-2024-3400.json) (`2024-04-12T17:17:22.740`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 82d0b3b0d46..36a609e97c8 100644 --- a/_state.csv +++ b/_state.csv @@ -61782,7 +61782,7 @@ CVE-2013-4403,0,0,28a21b9d42e050761853e46ac5e5c0348f77cb7a4b0ea345e913601c8362f4 CVE-2013-4404,0,0,61ff9d37885753c69a9ff935278c892ff319444a8bc4a7e7afebef534520bc00,2021-07-15T19:15:33.280000 CVE-2013-4405,0,0,51dfa07d000da823a19d207e3cb7d9e2bca8dc30ea9ed888671462e63ce03fb3,2023-02-13T00:28:55.730000 CVE-2013-4406,0,0,f596fb2bb363e1e4a2cf44e362e4ed19adca01c067fae7dfd02ddb411db25761,2014-05-19T17:10:57.210000 -CVE-2013-4407,0,0,d41a7cb84ab3bdbafefa4555e179e061eb4a575666974bf856e770cf77587367,2024-04-01T00:15:48.783000 +CVE-2013-4407,0,1,de071bc7983241debc66ef39251f0899f98df90a8ab549775003aa27e53426bb,2024-04-12T16:15:08.747000 CVE-2013-4408,0,0,297c5794e4cfb7501864cd25fe03a2f9161548bb00ea98feeb2973b1ab5f7513,2023-02-13T04:46:54.753000 CVE-2013-4409,0,0,bf977edf3664326e2d356076c73083afd99299adda98f16df5b18e127a5705a9,2019-11-08T21:34:01.507000 CVE-2013-4410,0,0,f8bf108b2d1a12aef3a08737d6a14c7f676d5217618d3327c11606cbc5c174f6,2019-12-13T21:27:31.417000 @@ -190808,7 +190808,7 @@ CVE-2022-22057,0,0,d541aa9a8d5af711fe50c43cd571fe0a23969edb114267acc3e61075e9718 CVE-2022-22058,0,0,78583efb4a785cfd0b5baf97ee1e7c82d05312d21f8adf4720e39255cfb8cbe9,2022-09-28T18:28:02.767000 CVE-2022-22059,0,0,3e7612f59b4ac9e55a49d3d1ddcf82ccdd70d32516e608dfd69672e125537dc9,2023-04-19T17:10:55.030000 CVE-2022-2206,0,0,de221cc42aa753166c81e44872a4f4353b78100cdd7b2e27b9b450c4fbb9f5a9,2023-11-07T03:46:16.810000 -CVE-2022-22060,0,0,d0b98b2f34cbcaeaae8acfc42c5e62a9277d42c97426ffbdcfc651c534900f71,2023-06-13T19:05:32.743000 +CVE-2022-22060,0,1,f97a95d470e49b43b26530b39a1d55707eb60a0acc98af7af5c1acc87cd65a60,2024-04-12T17:15:53.667000 CVE-2022-22061,0,0,c8319d9d6d743f0a08849bd709c33a926fa60312c440efa98204d5de1556d5a7,2023-04-19T17:10:55.030000 CVE-2022-22062,0,0,4892192c9fc415667f07649cae626cb5b76f3861656912b87b166f115dc5173a,2023-04-19T17:10:55.030000 CVE-2022-22063,0,0,d06d095563769c8e9e0be7f07db740f6a721ea9f0cb3a9dcf3e7ab812790ab11,2022-12-20T16:17:41.863000 @@ -190823,8 +190823,8 @@ CVE-2022-22070,0,0,969cdb03750b10236cbd04d6680a26e2da10de9365b6be6dab878737dc7b0 CVE-2022-22071,0,0,55c0c951869fa9a0afaf09bc8e13361e71e3d299c5b71c1d8d554add243704d7,2022-06-22T14:46:08.413000 CVE-2022-22072,0,0,d59568644cd2bff25e82ec49880b17f8508cd90ca2a2efe112b7a1cfe1926ef4,2023-08-08T14:22:24.967000 CVE-2022-22074,0,0,be22a7ff1d275f253f2f30c408572121751781a074f6100057c8e693a3409133,2023-08-08T14:21:49.707000 -CVE-2022-22075,0,0,b7dd394cfb7dc587054b8c8a9ebf12c541b18f6443a9d6b85b6a9329a97be83c,2023-04-19T17:10:55.030000 -CVE-2022-22076,0,0,a9025b27f58db8472d2d2d82f5d2e8443c374f57f51816d825b5fa591c2c857e,2023-06-13T19:04:27.303000 +CVE-2022-22075,0,1,48c9619e57d6e2f4e3a1e3beacc97e1cbcda4e5228e5eae10a8d8d292ecd1573,2024-04-12T17:15:53.910000 +CVE-2022-22076,0,1,ebc2f2c3203e74ed3a09bf17b3ef9bd0aca3ee36bb67e65780f21288b60c0be1,2024-04-12T17:15:54.350000 CVE-2022-22077,0,0,42be11c873b139b1faecb798f0cb9a42fe5a8a4b02474a5ec691fa772479768a,2023-04-19T17:10:55.030000 CVE-2022-22078,0,0,dfc2a0a478db5909998fb69f2bdc9bcf8dc17c92efb4f0f44fbd57f8d652fcb4,2022-10-21T20:18:09.963000 CVE-2022-22079,0,0,26235438aa3e7dea95b3b8c1949ce584f44caf2fded80380a7b24a6de8e8aeda,2023-01-12T23:59:02.387000 @@ -193981,7 +193981,7 @@ CVE-2022-25651,0,0,a7b891d70f240a20bbf0a5f655729b9363b13dc3c66e6833dd3cb0a958993 CVE-2022-25652,0,0,23dbf0165900e78fdbd2709d15f140f84f88e153926765b606c16e9dac81f65d,2022-09-20T13:20:00.463000 CVE-2022-25653,0,0,41feab9a9f53cc4e146fc64a69552a698c767d23ab2a7c676cca00300748348f,2023-04-19T17:10:55.030000 CVE-2022-25654,0,0,facf9136124b8a1426570dc18152541162edd31d92f7782328f88d3f0249db30,2023-08-08T14:21:49.707000 -CVE-2022-25655,0,0,25f0f7abc3581dd1199a01312ab18ec5b7a0df02a00b08c44ec0ac5b31643285,2023-03-15T17:05:17.123000 +CVE-2022-25655,0,1,7d7b83ae4eed73c2123fc338d0774b0bb9ddbf2752b33d0d18aea32adbf71c1d,2024-04-12T17:15:54.893000 CVE-2022-25656,0,0,91ddcba6669902ce460b24babdc2fe2682aaf33a3f27f78d433b0b70d404c252,2023-04-19T17:10:55.030000 CVE-2022-25657,0,0,252b5fa1ccb29d5ab3cce05e6f9e6a0ea8ded19eac1a0e1c9c661fd87e769cd0,2023-04-19T17:10:55.030000 CVE-2022-25658,0,0,0b356c2b091db9a81d05a7cd3435a0761c167a9d7ca5407b03717a18afdca5a2,2023-04-19T17:10:55.030000 @@ -194006,7 +194006,7 @@ CVE-2022-25674,0,0,7544bdae372109d2659725c748d7c26fa9d89371d55d8b212236dcede36ba CVE-2022-25675,0,0,3ce5c96a7838f5209e442d094032ec0992d1b5a02c32958bc7695fc99225e0bc,2022-12-15T16:49:10.520000 CVE-2022-25676,0,0,9e6cfafdd583255a790fbc1cd87847db5d995b0fd34e4bc1728070e318379b15,2023-04-19T17:10:55.030000 CVE-2022-25677,0,0,9c2fec5a469cf5f5e4a288e2e597cd5d70c58ad068678e0e6ae3b40aa50f19f9,2022-12-15T16:49:27.473000 -CVE-2022-25678,0,0,62f570c1f25f76af78515c3e122c7ef122551ce27185ad99567342581ce9ed99,2023-04-21T03:50:43.547000 +CVE-2022-25678,0,1,65897240493ce1826e053c9a003530b9ae6f9782925f229065cc426b4382d0ca,2024-04-12T17:15:55.310000 CVE-2022-25679,0,0,3626be87e888fc6cd7ad51df0e75b08e83ffbd87ceafd9c59dc5b379ba718c4a,2023-04-19T17:10:55.030000 CVE-2022-2568,0,0,60a2860101755ecad8bf3edc9ceff649a44fb70d76cb4a66fcc5a30949e12b1d,2023-02-12T22:15:28.260000 CVE-2022-25680,0,0,536f3fd765d7f71a85ccb7a14ce4f12d594fc8dd3f81a69702b20dcf909f5b68,2022-09-08T03:11:34.310000 @@ -194022,22 +194022,22 @@ CVE-2022-25690,0,0,60c36157487ede56ce0bf02ebe2210008d31b016632c73d19a376c5adb4f8 CVE-2022-25691,0,0,e39085a4ef9affc619f9844a4e2bb6300d63fae15e17ace5c3cdefd7085da615,2023-04-19T17:10:55.030000 CVE-2022-25692,0,0,b299b4a2b4812134b8589ea267d400691e75bc8aa0c7a65e9b7116358e3de040,2023-04-19T17:10:55.030000 CVE-2022-25693,0,0,301d20525cad4155c81298d423e14560d347dfabc9417bf1514736d05d67852f,2023-04-19T17:10:55.030000 -CVE-2022-25694,0,0,96460312489db8325872c4633ef992ceeda3855a4ccdff182da701220626fa11,2023-08-08T14:21:49.707000 +CVE-2022-25694,0,1,6d4acca3fe8cc840506c49807d4b40055da82b5288d9b518e2af57bddee63c50,2024-04-12T17:15:55.530000 CVE-2022-25695,0,0,5741d374045755a68156657d02d5e05d2032794c8d3b9d3db2bcf28d026c878a,2023-04-19T17:10:55.030000 CVE-2022-25696,0,0,6a43475051d5b15ec071ab8f4c410d4d6850a559a1b9784d90a36f915e8b76a7,2023-04-19T17:10:55.030000 CVE-2022-25697,0,0,cd0ca1e3c48146797ecb871952b0edf6aef64ef8ad3540e802dc9ddc5b07acba,2023-08-08T14:21:49.707000 CVE-2022-25698,0,0,2e9e600777b53e306d63add6a0ed0e800513a00195aacdb10659ca1115981ade,2023-08-08T14:21:49.707000 CVE-2022-2570,0,0,b70dc897e658623031bba1b5134799bf711ae0f94e1c35dcddfad6b8195fe077,2023-11-07T03:46:40.293000 CVE-2022-25702,0,0,f5875b17d855ac4e1df4405169c8d5f1d48ba57b3f2d55fd691d879b920bfe2a,2023-04-19T17:10:55.030000 -CVE-2022-25705,0,0,f9ad3b98a2b7ba4073203850a37ba321d71abda37143142c19482eac31db32ac,2023-04-19T17:10:55.030000 +CVE-2022-25705,0,1,1819599041136705c9a8c5969781ac22c3a352dd0b990998f390350e4f62674c,2024-04-12T17:15:55.970000 CVE-2022-25706,0,0,501379a5c0de7bc0beeffe977bce3fcc3f07058dfd4a7006f235cf51c36fe124,2023-04-19T17:10:55.030000 CVE-2022-25708,0,0,acfe2c05c5b68215cb9d639f3af436455ba575adbf346321bba50c472c27049e,2023-04-19T17:10:55.030000 -CVE-2022-25709,0,0,a2fc7bf597a7fd799945616211fd8eac44dd100b3105f10c7943cb4e5f2336df,2023-08-08T14:21:49.707000 +CVE-2022-25709,0,1,e7c263c47c8b7100b2c357bbd75ae5cc34c522f0cde430ec2ccce23ca2d034da,2024-04-12T17:15:56.357000 CVE-2022-2571,0,0,9b7e485a17b13195c0c8d014111a284525bcba3eaa358e8f6c43e65ac057a9c7,2022-08-04T23:31:14.387000 CVE-2022-25710,0,0,df4942b0e636eb396268e718f07a0ca7fcbe53aa6ab5bc1f87f64d84ae68cd40,2022-11-17T21:49:32.380000 CVE-2022-25711,0,0,6f3e45c845cfcd3e714fea764a2f4d32573bb7bb105bc5485582d1bf8d917fba,2023-04-19T17:10:55.030000 CVE-2022-25712,0,0,f6bb45fe90d5ff492763736aa5b3a8e7f1cc851aa4de6194c010877130300d4a,2022-12-15T16:52:58.487000 -CVE-2022-25713,0,0,63c11285c905f6fa8982b83b79f9289332a15cf489db4f4ef05e2e71ebc2ead0,2023-05-09T16:38:01.897000 +CVE-2022-25713,0,1,eac4e08b712a59db682e55e61ffcbda787e48cd6485c3ed782a1afff9db01ad4,2024-04-12T17:15:56.570000 CVE-2022-25715,0,0,578af0cdae34a514c1a5792d9b2c209c891bb32fde2d30aea57212c0918bfca7,2023-01-13T00:21:10.373000 CVE-2022-25716,0,0,368f676cdb1b416fbe8603d2d6834d696b06601c371f50beae123bf892394990,2023-01-13T00:34:17.213000 CVE-2022-25717,0,0,ada21b03fd05a1c13116ed8820a9754ac93e7dc413a94620028e08b6a9798134,2023-01-13T00:51:33.693000 @@ -194050,28 +194050,28 @@ CVE-2022-25722,0,0,74700587ca20c4cd2417a0eb665c88b8311b52893e53a2b47a88686ed97f1 CVE-2022-25723,0,0,b5ecb10dbc8bb8b482118b725113dc122d4d6377b2ef5a25dc94a9cd823627fd,2023-04-19T17:10:55.030000 CVE-2022-25724,0,0,6dd0cd4c002f31b5355bc160f90cebecb7f69b5861e93361cccc3a5c79636e2c,2023-04-19T17:10:55.030000 CVE-2022-25725,0,0,495e1b976e4e675a0feb4a22ddf0bb17a3604986ce895db138719c75355eda45,2023-04-19T17:10:55.030000 -CVE-2022-25726,0,0,3c2c980ef36313b3ec686eb8b17b0a2dddfd131bfb91c46f9d3e194b3db6f68a,2023-04-20T22:27:54.003000 +CVE-2022-25726,0,1,9b9e356a8bc877442f40756181e6da8a102fb8639f506c412e31ef536e9248f1,2024-04-12T17:15:56.810000 CVE-2022-25727,0,0,d5851af27dc18b57167c5f15be84e99b2f6f1400db2ca882b7f79d34a75cff48,2023-08-08T14:21:49.707000 -CVE-2022-25728,0,0,5cba04cf5f34b7f9039066024a00558d9e5ada3c318f2d0d3ab914fac084dc9b,2023-02-21T18:12:26.053000 -CVE-2022-25729,0,0,0ee61d6251dff97063441cd08ce69a4c8eea51537c60d80df1c30856eb75519c,2023-02-21T18:12:35.670000 -CVE-2022-25730,0,0,fb22978c3c9aec620c4722fe978a44b796e9329bd5daef2de9c077a206bfc91b,2023-04-24T16:56:39.827000 -CVE-2022-25731,0,0,8a5e9e1cd7b174ef3f95043fdde5908c25e7175b083318c7e38a9cfeff2094db,2023-04-21T03:50:34.460000 -CVE-2022-25732,0,0,ce9da05e678d5fb73dd362af1027613ba7ab7b3900a9ffa358536b8fa035da5f,2023-02-21T18:12:42.460000 -CVE-2022-25733,0,0,aaebe8186a754b0e91cd68246a7f8e95d29831f11b3678493265b69157c5f2fc,2023-02-21T17:44:58.377000 -CVE-2022-25734,0,0,0c989c37bf5c06902359f8f02ddb342f1a119c6e0e8fb955307e7d4acc17bb4a,2023-02-21T17:45:33.717000 -CVE-2022-25735,0,0,ebf46857e6ed2f5a7f065f498ac04c0910ff895ae3c92b93f4f09e600738dc04,2023-02-21T17:52:46.633000 +CVE-2022-25728,0,1,83fd959386f94cbf383f3068b59c7af3a1f4a8eea84ce9366a569d93b6f91ed6,2024-04-12T17:15:56.960000 +CVE-2022-25729,0,1,ea612b31d8061ffe4d0031a36877f70bc51689df7236ab44f72cd67a9aaedaa3,2024-04-12T17:15:57.147000 +CVE-2022-25730,0,1,736e114ccfaf882ce82f2bb8c0ba360e1bb3525be7203f888f7f0b466500cf26,2024-04-12T17:15:57.350000 +CVE-2022-25731,0,1,e5e501f4a95e399e5a28144331993a16269d88fb252387827b1f37cca3011d80,2024-04-12T17:15:57.473000 +CVE-2022-25732,0,1,84e501b96a76a5a9cd713a93bd7237e2ce2133d2aa38f3f2d69ed2e98e42bb57,2024-04-12T17:15:57.597000 +CVE-2022-25733,0,1,85477e371222acd2da8df9b1912bf7a94ccfd5923588ac1c2ab325f26c686097,2024-04-12T17:15:57.730000 +CVE-2022-25734,0,1,95f7c1de3b6bb11ea30b1634b0b452aabd259831be2b6cfe630598be922f0776,2024-04-12T17:15:57.897000 +CVE-2022-25735,0,1,4ef01b46dba4e2b87234da06d314cb3155c7f1ee64f1e2160b171af869f7da58,2024-04-12T17:15:58.063000 CVE-2022-25736,0,0,cb9254f6e85fe2b56cc85eae69b216eca94563c9155f77330e77a495a8b46b03,2023-04-19T17:10:55.030000 -CVE-2022-25737,0,0,e43448db60d4596b78372447359161881b0f702215779e61e3dd7b650cb1e0cc,2023-04-21T03:50:27.760000 -CVE-2022-25738,0,0,4fe47991926e1f8e63f2a1a6779bdf1733ebd9c4b5980f19fcf6a417aa4a3303,2023-02-21T18:00:21.640000 -CVE-2022-25739,0,0,64169301038ab584d3642f426c106949a7be6a45216360a006e2fdd05c380864,2023-04-24T16:49:48.737000 +CVE-2022-25737,0,1,9c3ea4901f4bd1bf9a836ad9c2bd4e9f7cf044ed70c70e53c8e7fd61aed68734,2024-04-12T17:15:58.200000 +CVE-2022-25738,0,1,312d2a2a6a31fce92e7dbb55bdc49d83d039ef2153eb6a9cbb878c1ea777e85b,2024-04-12T17:15:58.343000 +CVE-2022-25739,0,1,d1a2c46b35d7e57f8bb53f6fecc90a4c83a038d5ee434089f817155bf7225062,2024-04-12T17:15:58.503000 CVE-2022-2574,0,0,912e1f4085c8a29139fc365c0b4a8e5cc4a7abf51b537ec591ec67e6d64ee758,2022-10-21T16:19:08.857000 -CVE-2022-25740,0,0,e016369476109d05a74e897e2a120fe919ecdb67660cbdd3a20ec6e49bf2ead5,2023-04-21T03:50:17.157000 +CVE-2022-25740,0,1,29df8dcfd20b3bbfd4bc45d50bff89a657cbc629e3ec09945f0e3739953bff45,2024-04-12T17:15:58.680000 CVE-2022-25741,0,0,836f637f3a5ad77fa8a38daf8f199116512f9c85e90e836396b40a01cea95564,2023-04-19T17:10:55.030000 CVE-2022-25742,0,0,1f642b74b2e47742a906b991937e36d22c0814d75194a25590c3bb38b6b92fd8,2022-11-18T05:00:55.663000 CVE-2022-25743,0,0,57c0be1263d79674ee99456d75d9ae64126afd6f681e74a77c1110ac1752359e,2023-05-31T19:15:11.893000 -CVE-2022-25745,0,0,655320f051cf306ac044d943c68efa73a04825524ed529a4420ecb0df7114204,2023-04-24T16:20:18.903000 +CVE-2022-25745,0,1,8187a382d030c938a3259c4b1417a69e0406afb705ebe2e271af721ee099bafb,2024-04-12T17:15:58.823000 CVE-2022-25746,0,0,c84e4ae12513f1cdf7a3baea0f794e2afce484487477586d492834115a41f7bc,2023-04-19T17:10:55.030000 -CVE-2022-25747,0,0,df3058f7ca5c47db464c14e69d5abdf7dcd6f442a7ba13067bc017127c2086fc,2023-04-21T03:49:56.473000 +CVE-2022-25747,0,1,424d970c7674cb0c01ffbe0c0bb759c7bc10df89212cb6915689b46762f78cf5,2024-04-12T17:15:58.953000 CVE-2022-25748,0,0,274e680c7efc52d36a6e94518f6930f3269f8753a8a4f893b0a8cafb6f25bb88,2023-04-19T17:10:55.030000 CVE-2022-25749,0,0,f9c1aabdb96d38386d7a29450a756ddb9421188a4e1211a82dddd9bb79c9ba54,2023-04-19T17:10:55.030000 CVE-2022-2575,0,0,92f5f7cc9c09c27b7f85bf6edc58e3c8a852f7034a0b5f7d730441e50f491c7b,2022-09-20T15:23:57.317000 @@ -200180,29 +200180,29 @@ CVE-2022-33208,0,0,55283b13612d536b168637ef3e2d3f2c14b6212c395f52aa023a2930304a3 CVE-2022-33209,0,0,b5661f180076cdd4fbafcb7c232c4d5f61c95be7a05e0ef3bfb6c675efe81bf3,2022-08-24T17:00:12.827000 CVE-2022-3321,0,0,b2b1de724f0b35bc0ad684bc2d6408eb3e7265af0b537b00b18c9e150d06d89a,2023-11-07T03:51:06.493000 CVE-2022-33210,0,0,89c6da9510908c6fd304063f0bbaefead22bc638a9b17847d768802c480b56cc,2023-03-02T16:41:06.540000 -CVE-2022-33211,0,0,3f2a109d10fada4188c6fee6bd63173106e9d3be6dfc69d94fa3248be729a52d,2023-04-21T03:49:45.543000 -CVE-2022-33213,0,0,7c848f9cc968f9c8668b2d94a99d8e39eecef5ae83e1718ef128db6c54c2f8dc,2023-04-19T17:10:55.030000 +CVE-2022-33211,0,1,88cc4467e404a8c45350ba98c04e25e1760373e1ae2853665b51ecb49bba6539,2024-04-12T17:15:59.117000 +CVE-2022-33213,0,1,813312259dafc218d7ade45e12dce3bc18472a2fcf66d9d219cc04f62f0e1c7b,2024-04-12T17:15:59.247000 CVE-2022-33214,0,0,71573302cc54a9e4227e0f298915ac63edc782322e0224f0c9c623431c28bef9,2023-04-19T17:10:55.030000 -CVE-2022-33216,0,0,f4c2f57a54d4113be9137a443048d3f7a9dbeac335dce0f1f121b1e622b3b923,2023-08-08T14:21:49.707000 +CVE-2022-33216,0,1,c614eb1697c91ce6792dbeb77cc30d102b87b9f568c648aacbf0972e123b17f0,2024-04-12T17:16:00.283000 CVE-2022-33217,0,0,1589a5e0878a847079ad2da0cc2c68bf8051e6f424dbb15cc90f4df10aa2961c,2023-04-19T17:10:55.030000 CVE-2022-33218,0,0,6e4e126ccfd0c343c1434e2821fc12c246089194f4de059aae5822cefeb8593c,2023-08-08T14:21:49.707000 CVE-2022-33219,0,0,b65fa72d4166fb17fefc5bdf9076527eb9647cdffa0ef417fb74cb64305e3475,2023-01-13T02:01:52.683000 CVE-2022-3322,0,0,872ee1b6a00145abcaaae0dfb21f3a3d21ca4839f02938627d331922f19aa7e6,2023-11-07T03:51:06.730000 -CVE-2022-33220,0,0,27f0a89193c041261927681d7e36f5cb29f0a17cb843ea5c237953af7b33901d,2023-09-08T16:44:50.403000 -CVE-2022-33221,0,0,227a8d65fd7df9c4a7b1ae225b1303955478f82006e77d817b2041bff64c3634,2023-04-19T17:10:55.030000 -CVE-2022-33222,0,0,703de2f364aac2d6e60853c1dfee85f9a97c68b2cf129ed8a8ee308405b33881,2023-04-21T03:49:36.037000 -CVE-2022-33223,0,0,2f22991e639e6950f55087721d1f35c808c47ed4669d07d08fa0f46284035371,2023-04-21T03:49:32.003000 -CVE-2022-33224,0,0,6388f18c80a030e496af4fbbe51c08fb9e8c4e8313056b8e106966e5e16f42e6,2023-06-13T19:01:31.440000 -CVE-2022-33225,0,0,13055d14c0a08ed5987ccad4b666720984db6db94d16c9ab62cadcd56842ba18,2023-02-21T18:05:27.913000 -CVE-2022-33226,0,0,ba2299ecff0a13cf143670aa4f1064b3da32163b285ddda07db2639d67d12cbb,2023-06-14T02:29:21.887000 -CVE-2022-33227,0,0,28eca109c5a33b90e42222ddf2e7fa128b46512e33bb75b4d314fab95c7b4a9a,2023-06-13T16:54:21.383000 -CVE-2022-33228,0,0,0b340a1f91eef2a77914d339d28c1c684947786e521901db2ccb7c77e25bdb29,2023-04-21T03:49:24.863000 -CVE-2022-33229,0,0,193cc64f95c071614606aa15f43090f3c1056b6882ebd428e3880d1c46c1c990,2023-02-21T18:06:54.587000 +CVE-2022-33220,0,1,f29e0211fb766bf5d8c7a5e473756cbf954d2f54204a11ecbeab34608556eb18,2024-04-12T17:16:00.713000 +CVE-2022-33221,0,1,a1e8369179405bd2645c4c15000b157f9166cc45aa79959ec9a4f55a0230c723,2024-04-12T17:16:01.213000 +CVE-2022-33222,0,1,d7e01405fe8fdbe4ef8a469c9a91405f0bb04f25be469eeedaa80cc887bbbb47,2024-04-12T17:16:01.530000 +CVE-2022-33223,0,1,717504afa9b20a9250ef1b5cb9096758d0de3fcfac49f3f5c31efec5243ab755,2024-04-12T17:16:01.810000 +CVE-2022-33224,0,1,97f9c0ffc309c7089c1fea0f6066e31bb4aa3d6d2ab46518924db375823bd040,2024-04-12T17:16:02.103000 +CVE-2022-33225,0,1,de75e9ccb7a0e1a7874675fd839dc29085112bcf43d6f6af983917a0f09674ef,2024-04-12T17:16:02.457000 +CVE-2022-33226,0,1,754ac381a690d483cd4d8ce6966047db6fd2d5d71ecb3789ac15603afee9c6fb,2024-04-12T17:16:02.763000 +CVE-2022-33227,0,1,a56a1293312a52af8d7fc9e67925954c50295df699c3f8e8a87a56c17888306d,2024-04-12T17:16:03.067000 +CVE-2022-33228,0,1,218741ad9625d99869a92769ed5ef3c85945fc0abcfb97bdbb8a6c4ed62bb9f0,2024-04-12T17:16:03.520000 +CVE-2022-33229,0,1,a2e34c1fc03870c1adc3d3f5c64c42322ace9e5e43af099e319660218207099c,2024-04-12T17:16:03.873000 CVE-2022-3323,0,0,8be38c324c93e95819adfd3e82b1a66363f9d91378ec6aacfbbd4ee83b344847,2022-09-29T16:41:35.093000 -CVE-2022-33230,0,0,9d5285f50e341043dee22848c3ed2e6486e667ae7d5f2938110a3ad67821f0c0,2023-06-13T16:53:50.757000 -CVE-2022-33231,0,0,eb07f098ec80fabfb2b1df0f884677082871e608af28978d3c7f4c874537aa92,2023-04-24T16:21:14.963000 -CVE-2022-33232,0,0,f3cf2a5a310fa98fd205fb7d1500f43f5b79235878e712fdf3f1a3998e50aefe,2023-08-08T14:21:49.707000 -CVE-2022-33233,0,0,7c41377841065d7388913789c84abce8a24e56e2de9c6ac8de31e22929469064,2023-04-19T17:10:55.030000 +CVE-2022-33230,0,1,ae5fc35d10b1c4a22141ba58ec7903f99c89b1e845e0fb3c1c82a826d0dc3a08,2024-04-12T17:16:04.320000 +CVE-2022-33231,0,1,6f944f0273e6c491bb566f54e7499e8bb5e67a7b2c8eac0da20bd65d373ce00e,2024-04-12T17:16:04.853000 +CVE-2022-33232,0,1,48d873b64bf58b0c12a4ece54647ec8ffa3f60940b52d310ee71176791aadd03,2024-04-12T17:16:05.717000 +CVE-2022-33233,0,1,a5ecdc27e8abd3db40020bc77d68b5dbe330cc7c179e2f7635ce691b19691fb8,2024-04-12T17:16:06.730000 CVE-2022-33234,0,0,287021844eb75a36198a098ad28b18b20fdaf133ae89f78bf034f718d13bc49f,2023-08-08T14:21:49.707000 CVE-2022-33235,0,0,9441cffcceb6e8c142a93c8bd1f367c9d475c79dd42fa3c3d0a51325c42147a9,2023-04-19T17:10:55.030000 CVE-2022-33236,0,0,3a409237d0c74bf05e12ee23ea8df47cf42c77696fa63617b0f72c63c438bfbb,2023-04-19T17:10:55.030000 @@ -200210,74 +200210,74 @@ CVE-2022-33237,0,0,8279508defe5f73bc33f0db3854cf7bdb671fda9f99008701530364a03a72 CVE-2022-33238,0,0,b22800923ff53b09e2c7fccb6a33bf9334c6f4b79c732c2200baaf9fab842149,2023-04-19T17:10:55.030000 CVE-2022-33239,0,0,0abb9a10341a15ffe265c159bcc1b6036c8749317810f1b49e89bf34fe4ef6d3,2023-04-19T17:10:55.030000 CVE-2022-3324,0,0,e232f0fc17e6dd3590d1d2a4fd6d6a057c14592ebc93d525da8dbe35a1703415,2023-11-07T03:51:06.897000 -CVE-2022-33240,0,0,40518112cd1cc6c462ff68df486f5bdbed696fb588ec7da2b4403dfe5e6ee092,2023-06-13T16:52:40.600000 -CVE-2022-33242,0,0,39d7f621e7d6b902c584e77ea779fac6e7cdc2406aab070537cadcc723e59284,2023-04-19T17:10:55.030000 -CVE-2022-33243,0,0,7725b8f8895234d763229a328d4380be562391d3eaa0009406f11f10b2017f36,2023-08-08T14:21:49.707000 -CVE-2022-33244,0,0,1d58a358aa6022db9793ce5e9b53799a421fc16b5d6924c64ea9fb5c49af87e7,2023-04-19T17:10:55.030000 -CVE-2022-33245,0,0,b831d54f5b182437c9e433c0559979c4e7135c21893a2c114e30376e48e2aced,2023-03-15T18:59:19.243000 -CVE-2022-33246,0,0,07c69ae5c38dee901d54879a8775275612e1eda8a94f160655e9246a56e44b8d,2023-08-08T14:21:49.707000 -CVE-2022-33248,0,0,10b51981662f1a66215f6d9bc7dea72db4ac7fbbfe3e020fb39f94e207489747,2023-04-19T17:10:55.030000 +CVE-2022-33240,0,1,a431a988d7817d807aedd7b7d33905056ba2abbb08523896bad00705efa380c7,2024-04-12T17:16:07.560000 +CVE-2022-33242,0,1,a91e1e8cebe0d25eaf3c677f8ca5a1b4701f474e25d2503162b030fee6ad937c,2024-04-12T17:16:07.980000 +CVE-2022-33243,0,1,60e0667af4932f69dfeddf70ab85f0307ed4aae7b33dafa37d60f692da5315c4,2024-04-12T17:16:08.560000 +CVE-2022-33244,0,1,3ee08aa09a045fd91f9a2932cccc9fbadd4b205e5b277acbb287b3371664056d,2024-04-12T17:16:09.260000 +CVE-2022-33245,0,1,9bf150766dc5b76acd4085b6450b12694bf1bf4ff8bbb581645c049871b117d0,2024-04-12T17:16:09.680000 +CVE-2022-33246,0,1,c92445ea4b143dd5b10578791f1811b83c0b115f3a8f8c5b0b2e17e55bba644e,2024-04-12T17:16:10.150000 +CVE-2022-33248,0,1,0f659e2623fc1706b7a52e44050c440afc3f66628b78793d71bdc9156ef331a7,2024-04-12T17:16:10.593000 CVE-2022-3325,0,0,dd195acbe719e05394cbed0f080aa81ff8523914e8030666b0a42fdc0ee0377d,2023-08-08T14:21:49.707000 -CVE-2022-33250,0,0,f2704b8185ce4f34c5ce93c026af1f7612a496cfc324d9c62d03b4c322bc1554,2023-04-19T17:10:55.030000 -CVE-2022-33251,0,0,7d56f4e7a70917b1d526fa7e63029ab5dc8c8c21e9661064ef544e6d4bc4967c,2023-06-13T16:48:04.850000 +CVE-2022-33250,0,1,7e16f301ec38c138c511b21aedd28e32c8a4a6604045b36000b48431820d15fb,2024-04-12T17:16:11.233000 +CVE-2022-33251,0,1,1e9cc73224a99e941fdbd943cde721ba8429a946ba479bb91d94b9ab8ee2c2a9,2024-04-12T17:16:11.680000 CVE-2022-33252,0,0,c951282a1d20ae2eca0990838605f02c1902d4800721e170b023f50da53d0fcb,2023-04-19T17:10:55.030000 CVE-2022-33253,0,0,a5467b1fb8b5ec92902d1f9f713857d6eb3d1eece432dcb1d3eaa046e615aa9a,2023-04-19T17:10:55.030000 -CVE-2022-33254,0,0,b907617c6b6b0e1dc587dd86fd12b9491e18fe4ec192eea6073c10443493e8e4,2023-04-19T17:10:55.030000 +CVE-2022-33254,0,1,6c5a570d36680c0af6a6de603aa296a92cf98d7c84720210e46e6b26733adec2,2024-04-12T17:16:12.140000 CVE-2022-33255,0,0,06ef57dbcc2c453da4ce9e006c90fcf61bee7edaa5c8f3698466b92e29ebac18,2023-04-19T17:10:55.030000 -CVE-2022-33256,0,0,058f6bf8a3395a1f5e7ea71241f254f69f4c728fb600aba42ec86579b48da3d7,2023-04-19T17:10:55.030000 -CVE-2022-33257,0,0,763d97438b04168209f165fb01059d04a3b224fa099cd6ee9789fa50d16ca29e,2023-04-19T17:10:55.030000 -CVE-2022-33258,0,0,e9a6d4b7614c3eb9b0c0c63551dcca6fe25e07da147d7f2a1a7069e60e100855,2023-04-19T20:00:23.570000 -CVE-2022-33259,0,0,d3e5e46a10edefab5ea87a97e6682e9d2b326c13a35b026e313f53d6a245a3c7,2023-04-21T03:49:17.797000 +CVE-2022-33256,0,1,2d6cc153c6695c8e305f45cdd0d8e13d96299fb0192fc34021e05d67ac1da2b9,2024-04-12T17:16:12.590000 +CVE-2022-33257,0,1,992b77798670bfd170c2a9143d581c23c5469e92578abfae4821f2e67d81dfd5,2024-04-12T17:16:13.023000 +CVE-2022-33258,0,1,b7da769481f6660b78d40c4a5cf0051ca46fa99530bebed80c7b815674262451,2024-04-12T17:16:13.643000 +CVE-2022-33259,0,1,017567383767a619f93016567d1ba54d328eecc28af83fe0d3c46eb8b3a65001,2024-04-12T17:16:13.997000 CVE-2022-3326,0,0,2e0c58e4c196f5058d24fd8447d6e88f4709c75396c8dba9eaa21601f65d7866,2022-10-03T14:07:05.423000 -CVE-2022-33260,0,0,7709dfdc27e63bb1b598a9f411313816199f119511a5f14fe4bb7a7a09bf8974,2023-04-19T17:10:55.030000 -CVE-2022-33263,0,0,d74f81e9ca4ec15c5cae26094f892fd5842689fd5bc30ceb329a6bc6100881eb,2023-06-13T16:47:35.737000 -CVE-2022-33264,0,0,51edbd4dfc93af66863e0dce44ca83e1032ab8f1fb12fd186820debc1e945f14,2023-06-21T15:59:18.387000 +CVE-2022-33260,0,1,d246569d3d5035684f44d8c40289e8c9936795461d0d2f1e292a279c85e5a3d2,2024-04-12T17:16:14.353000 +CVE-2022-33263,0,1,cae5b9dd821af23c1e5fc63a3b03f915814ae57ed757e76a20398723ed1336e4,2024-04-12T17:16:14.780000 +CVE-2022-33264,0,1,c2898e340505d02c3cd76f7804318e8e41dc99138546a4aadd9b34e188dcdf70,2024-04-12T17:16:15.200000 CVE-2022-33265,0,0,10e64ee1bf46c73caed16e97b7159ea6c0f1baa0a8bfe7d65eb800aae26770c6,2023-01-12T21:24:49.817000 CVE-2022-33266,0,0,2b0432c5d36ca89f7c7b90cf0649496514833650338f4f4611d1bdd8eb0d6270,2023-08-08T14:21:49.707000 -CVE-2022-33267,0,0,83faa27bff23d0623f9f0c8577c38c32b10858fdba0e0071d2b4366cac75a19e,2023-06-13T16:44:32.647000 +CVE-2022-33267,0,1,15fe02d5ae53ff6ff63ba184ee5a6d985144e01a232aceb778a14e3c7f63a889,2024-04-12T17:16:16.290000 CVE-2022-33268,0,0,f84fc674cfcddb7de189e767e4f6eb2140f0fea87c9a8ec0e8f0f5d72dcc9c12,2023-04-19T17:10:55.030000 -CVE-2022-33269,0,0,340fd49b72f3e99c973c6770c854e140ee32ebe97272e4e0d8f60253e25640ff,2023-04-24T16:14:54.773000 +CVE-2022-33269,0,1,6876068d0b594d8e4e9efef05002f1a2456750a70a1e553a1cdeb690d815e30a,2024-04-12T17:16:16.760000 CVE-2022-3327,0,0,5bd8ff1809ddb32f139c66c9c17b0ba8c3cb1fe50a0f613145f17539be8a089d,2022-10-24T12:58:41.170000 -CVE-2022-33270,0,0,d4680ecba6cb01223305a8eb3111637ebc1542ee3bedc94549a10190008cd21c,2023-04-24T16:15:28.127000 -CVE-2022-33271,0,0,162b13ac7cd6328dce08a051d7d1662d639c3efd648a90d98afaa4f6fff915ce,2023-04-19T17:10:55.030000 -CVE-2022-33272,0,0,387a46daf12df51b2521080294f29bf5e0983601b066f3b8a9dbb00f3ba419be,2023-04-19T17:10:55.030000 -CVE-2022-33273,0,0,9badeb9e6de81f2d8432d119de1af8de71eb6aa92d2a37260c595adb24097432,2023-05-09T18:33:28.843000 +CVE-2022-33270,0,1,41838a84005cb868041e3196ac2a9988122d6dadf6f6487db97da076126a02ce,2024-04-12T17:16:17.323000 +CVE-2022-33271,0,1,fdab8aaef5e0bfb87766ccf6c7ec9cace860521893233350445ce0dd5f41f517,2024-04-12T17:16:17.670000 +CVE-2022-33272,0,1,bc43e819083b7a0cba181dc2606e15b74c7e72fb7a4a3ae069be275e139352ac,2024-04-12T17:16:18.540000 +CVE-2022-33273,0,1,829daab30261c6d4d94c685abb06a5f56eb167aac8dd0cf3ef9d264cdb9be120,2024-04-12T17:16:18.990000 CVE-2022-33274,0,0,75c9d959e6fbc94325df091f2158bc0ee0b41fa8cf794d057465140438d7c9f3,2023-01-12T21:00:00.877000 -CVE-2022-33275,0,0,92b03f49c206e491c4fda80863a72c91d95d7c55abdf1a28143148f4e574f1d7,2023-09-08T16:44:20.943000 +CVE-2022-33275,0,1,fae54255e414053c561762718a4088d31b5fa68dcadec4aa5faca44cab5a65db,2024-04-12T17:16:19.573000 CVE-2022-33276,0,0,d42205e09fe897f1c4222a099b0d60fdc7f2be64a5f2b0633cf8da0a77cffc96,2023-08-08T14:21:49.707000 -CVE-2022-33277,0,0,72c972c43c21e773ff5d59d300077c4926142ab44b971f4a0fdb02335e22566a,2023-08-08T14:21:49.707000 -CVE-2022-33278,0,0,9152c33b012cb4b29068cad22ca80bf6901e3aadc43c37b2a65c11ae1c0da4e4,2023-04-19T17:10:55.030000 -CVE-2022-33279,0,0,355e247bc6738267b8ce0e1f8b3d15d66e111fd1d634158a72b6f3185bc05caa,2023-02-21T18:10:48.183000 +CVE-2022-33277,0,1,9b63dc0272e9d6e37db34735131513f0966e8f0a1b431c45ddd28e7d00fde937,2024-04-12T17:16:20.980000 +CVE-2022-33278,0,1,1534689a47a76cab5ce3a3978561c3398b97bd13aa89fa3a2891dd3e55778f50,2024-04-12T17:16:21.577000 +CVE-2022-33279,0,1,0ecaee01004ca975d83227cf219c04b6d96e5b5a062e00e637dabc657f5e3846,2024-04-12T17:16:21.900000 CVE-2022-3328,0,0,bf50cd09e34e7b0fbd7111b7a845a3a2fc31f5ab295d3863af5de124d4dcce69,2024-01-12T16:09:36.723000 -CVE-2022-33280,0,0,8d1ccdd754be16c20eb59eaa7bf807d417e9378dd14183fb17ea6262075ef49e,2023-08-08T14:21:49.707000 -CVE-2022-33281,0,0,d6e5579f444a185bc5058c0b47b39a34a96df36bda9ca8a45fd431243b41a54b,2023-05-09T16:37:34.280000 -CVE-2022-33282,0,0,46c1ff05935daeafbfcdfb6a490e270c8e502b5bf596a4b7f6606ace43aaa683,2023-04-24T16:11:15.057000 +CVE-2022-33280,0,1,ee37118609c30da59defac3502d7c191bb3f45c7d72257a7171d58c3f9fb92e2,2024-04-12T17:16:22.133000 +CVE-2022-33281,0,1,1b4091453f1895b3bee4f694847e58a6d779b10ade5c6aebca429ac10a9c20fa,2024-04-12T17:16:22.397000 +CVE-2022-33282,0,1,f5dfd02c846c8dd4f5c14f8ee1ff43dcc5a790335a916d0decfe9abb835acb4a,2024-04-12T17:16:22.740000 CVE-2022-33283,0,0,79b213c488282c253d12eec871fa0739768a33019d629c914c2f26c4ba413611,2023-04-19T17:10:55.030000 CVE-2022-33284,0,0,1a3fff66a39ec3445a8a331ab80d7419e6db69765c9a900011666e2171f51e2a,2023-04-19T17:10:55.030000 CVE-2022-33285,0,0,79a271ce118105c238eb43ff639605d0b178643d035d4326a7285d68295708b2,2023-04-19T17:10:55.030000 CVE-2022-33286,0,0,8dd13426de3be4cce15a66023f3ecb605a5083e8d866bfdbb5338d7462e300a7,2023-04-19T17:10:55.030000 -CVE-2022-33287,0,0,017c0b81d8ad52ad5c236925f689ae57fed8d83556efbed8b4c8d2e2a871fd4a,2023-04-21T19:19:12.417000 -CVE-2022-33288,0,0,878d8eeae0b0001dca88bb3782190ec51a0653d427e613f508b297b91a5a5731,2023-04-21T19:19:45.383000 -CVE-2022-33289,0,0,40dcf856e7e46140fae0e7028eab96f300302fb45dbf78a3edbbe1c7b26bdc88,2023-04-21T19:11:55.220000 +CVE-2022-33287,0,1,c67411db376d243fdd5cdf5728c162942c29e7d582bfbf53562fcae5e119d5e9,2024-04-12T17:16:22.940000 +CVE-2022-33288,0,1,6469e1f7751749d16aad0317b850d5f8f5f2a07857be617618cd669420f52de6,2024-04-12T17:16:23.240000 +CVE-2022-33289,0,1,7699059bb3ce73a87f32bd1172e22325a91f544e3b1f9a57e1df46bfd9c9fde4,2024-04-12T17:16:23.697000 CVE-2022-33290,0,0,1ba2722346aa07bfbb6b1f8fbb87277cf4627911f5ff2ecaeba9463a6d31d1f4,2023-01-12T21:57:46.807000 -CVE-2022-33291,0,0,cb999863ab6a94a4d025fbfc28d55c4d2add6c720fa0f226c5c65d65da5be9c5,2023-04-24T14:11:38.507000 -CVE-2022-33292,0,0,4ccaef9a691efffeca8280527cac7df689863ef887738aec315d27b72458f7ed,2023-05-09T16:37:09.067000 -CVE-2022-33294,0,0,f6422c41af74868496c1657398b5d8f50d3f7c46f8d966674b21a0ec7f7aeb51,2023-04-21T03:48:19.810000 -CVE-2022-33295,0,0,f1695d40ea7449b455b00fc6501d1b5de42006d5c70153f98d2e72144127cfd6,2023-04-21T03:48:01.680000 -CVE-2022-33296,0,0,d23702ec71099fb6756088e878563c81659f1664794862940b90e73a791c3f77,2023-04-24T15:07:28.373000 -CVE-2022-33297,0,0,b36d0bf613d210c588555b5da381c30cd23efe27afcaf5031598344c156d9fc4,2023-04-24T16:11:31.613000 -CVE-2022-33298,0,0,0e43278b944fa344da182f8752f5fc0005e256118c67341b7af7d6b33038a5e2,2023-04-24T16:38:04.317000 +CVE-2022-33291,0,1,18103c8c8c9351c993e311bf33bf56099280ab4b7efac8659c1b04b8c292629d,2024-04-12T17:16:24.350000 +CVE-2022-33292,0,1,f4773187b5a3bd904154d9edb4e7c7b1ebf013cff44885dc953ef212d25a3129,2024-04-12T17:16:24.683000 +CVE-2022-33294,0,1,e63e548dce18280994a2324f9d3fe3ccf3edfebf35c677375e0e9e6bf9e05df1,2024-04-12T17:16:24.893000 +CVE-2022-33295,0,1,bcc48c289ce3535fa3a5db1a18e71564dff423ce915017b232008e028fe14232,2024-04-12T17:16:25.133000 +CVE-2022-33296,0,1,ff1bb5bc3b531c165c96e0e33e8a1ac39c74b989b6efb21642db1a0daab2581c,2024-04-12T17:16:25.360000 +CVE-2022-33297,0,1,8c44f77f47ac559bba39826c89a721bd9633110b1d346655598bcaa82e21acac,2024-04-12T17:16:25.690000 +CVE-2022-33298,0,1,6bde5c3470d898548a9ebbb3be670897c1cbe9b3656a6952e9d4060c0862a370,2024-04-12T17:16:25.903000 CVE-2022-33299,0,0,0d4bfdfffb942eca8f7ec7518b7408f3938181e032d2c9185b9fc37e72f94e82,2023-01-12T21:35:37.447000 CVE-2022-3330,0,0,066f0d24c6dcdf02d5b2281b5852bf927c11a513c22424f383c3dd3feaaa2125,2023-08-08T14:22:24.967000 CVE-2022-33300,0,0,57af5907f8076538eccb80a414046551423d371a658d31285661025da8cdf248,2023-08-08T14:21:49.707000 -CVE-2022-33301,0,0,d26165841fdcb4eb377ac5102769915366e9e3b612ae16d03d2a81807c2d7ffd,2023-04-24T16:48:09.743000 -CVE-2022-33302,0,0,87336c7c6f349dd513c32bb6aadcfbce02ec3c8d5483a65a352bf1ef9e00ad85,2023-04-24T16:34:08.083000 -CVE-2022-33303,0,0,ad2b4fa8375d5edfc5ee9d18a55c3612f2334fd1d45356daf5787cc9adac7ebd,2023-06-13T16:43:54.770000 -CVE-2022-33304,0,0,cd1dbdfd04e82268ddd52b6a1217b757a3801b5c09fa4574e135463eb762e70d,2023-05-09T16:36:32.340000 -CVE-2022-33305,0,0,e491aff0e8159876840790e4981958a4421a83a8400e0638c681daa607d0aa32,2023-05-09T16:36:20.023000 -CVE-2022-33306,0,0,0b1f2d4bc4cc52938f744edd6184ae5d7ec7c5f5346eccb89832d03503045c5f,2023-04-19T17:10:55.030000 -CVE-2022-33307,0,0,216a50b35fa2aba318631eb7e4efcb2ab84125a6e635e385b5841ede36dd4c4e,2023-06-13T16:42:24.980000 -CVE-2022-33309,0,0,d1d7ae94eb754c987d99b4202cf420d37f6eb91f24f2658d7a4349f571c4e944,2023-04-19T17:10:55.030000 +CVE-2022-33301,0,1,4d954dadb1394bebdd7cb24f53af8d8f3a4e99038922c96363d971b3368424bd,2024-04-12T17:16:26.120000 +CVE-2022-33302,0,1,80f7d03bebe3c231914411da372d37e2e1a73fe60cda1aa9cb27fbe81571c59c,2024-04-12T17:16:26.307000 +CVE-2022-33303,0,1,fd16d558c30f39504b876d7e4e445c1424adc28166d290e1ee8ba2c1ecfa7e83,2024-04-12T17:16:26.733000 +CVE-2022-33304,0,1,0940d2c1f3be8034a5f642a165db0ef8648d0b974db119e7b31f07124578b485,2024-04-12T17:16:26.973000 +CVE-2022-33305,0,1,b2e867e04709a54a398b329f555c582fec862893611ea46fcbee7829702a0c91,2024-04-12T17:16:27.233000 +CVE-2022-33306,0,1,07b524e60a455b2f959bd7efdfbe7729a7a0da10d0efc2cbaf74e3403711439b,2024-04-12T17:16:27.523000 +CVE-2022-33307,0,1,0da60a9202298e203ce1a82021ad59469eb6f9ea55a5bb94c860a7ef0aeb79a5,2024-04-12T17:16:27.877000 +CVE-2022-33309,0,1,28751644e01385e18bcf960c5ac1106e778fb36d4dc58cb515f21e75ffc29783,2024-04-12T17:16:28.247000 CVE-2022-3331,0,0,851577fca750e7ee18e4048e6e8c3bc249a9ac8a2ac8142870a49996a7e38a5a,2022-10-20T14:30:23.607000 CVE-2022-33311,0,0,362f7c1874cde896a9875840638cdc7719c8b4e3de5720040d0f0fa123744d00,2023-08-08T14:22:24.967000 CVE-2022-33312,0,0,ec7a84570e07311c7d52081c57cdb9469517a2a68d8da98bf0aae3117838fbcb,2022-07-12T19:53:27.693000 @@ -200681,9 +200681,9 @@ CVE-2022-34134,0,0,a0cb911c320db01a01633bd7270c7ced8333d0a38f7439bca453e942c9e6c CVE-2022-34138,0,0,c107e99e4d205516555a1a9acdd03df3b6f303a6b567b36f1cc4616fdac9fcca,2023-02-10T01:22:07.633000 CVE-2022-3414,0,0,83cd3d6753a98d1ba92c3bbe096246cb363b9837728573dd2e53d1725ad5f19a,2023-11-07T03:51:13.303000 CVE-2022-34140,0,0,0281d831a06acc0689aea077c1b4fe1d30cda3cc4d0e5d050610c8cb2d02cc78,2022-10-26T02:22:28.560000 -CVE-2022-34144,0,0,6b98c96fe185d3ee1098419d70c0008740b55415975fb57f042eed5dad5ee1fd,2023-05-09T16:36:24.253000 -CVE-2022-34145,0,0,12a19aaddaaae209bbc9c9c5cc2945b9fcb216588529a1d18d98377d76e4c05a,2023-04-19T17:10:55.030000 -CVE-2022-34146,0,0,fd6afecd0db25d5f6175ed223f885c789eb6b984950775f1ea19dc955e670755,2023-08-08T14:21:49.707000 +CVE-2022-34144,0,1,18af26c68992b658332c530272ff7635db6ff97bb08ef7ed470ee2f2cf316127,2024-04-12T17:16:28.520000 +CVE-2022-34145,0,1,cfefef2ec243f0ccff3ab7866a1fe78893a959c238a4e686adcf19739f24a92c,2024-04-12T17:16:28.800000 +CVE-2022-34146,0,1,6b2c22e6d2f81130d49774b58e46ff6373648c00739a4882320fd2d609b15dff,2024-04-12T17:16:29.040000 CVE-2022-34147,0,0,40136ddc85eaf6b3d8e5dc87e5c1f2c630833a3ff4f3891d042d8309a0857f59,2023-11-07T03:48:26.073000 CVE-2022-34148,0,0,c9d2de981388cbd28d430be2e4ba3e1c60d8072035f7b176467d9b8aa9fa9d64,2023-11-07T03:48:26.220000 CVE-2022-34149,0,0,208a127f49892324b55c730e75d774730ba1b1a3daedebff4c59e463c03aef48,2023-04-20T09:15:08.117000 @@ -205609,44 +205609,44 @@ CVE-2022-4049,0,0,7083f7e1766ed1f0a36422b50c1aa93f59347ff7bc0e4b68e4b8aa392adc4f CVE-2022-40494,0,0,0b8d79104468f26a8d4b8ad9ed33d43ef360cd73d9c0ad3a9442fbee0b7c47e8,2022-10-13T13:36:10.493000 CVE-2022-40497,0,0,27fc39651ca9cc0a68b100b5ec15dd76d9eaf6adf586343d8ef6c228c7936742,2022-09-29T15:19:41.823000 CVE-2022-4050,0,0,00509ce538097196d75097622ba6b42b2bb13a72ff7a574b3b2f43247ce5acf2,2023-11-07T03:56:48.343000 -CVE-2022-40502,0,0,8c0c703719a481fb0cdddccfe5a0c9d156f1401942dc896728f5ae94b826fc08,2023-08-08T14:21:49.707000 -CVE-2022-40503,0,0,80551ab42db1437d266f7076c201f1ed47c05e94d5a5a7b0e50bc861ce8c50da,2023-04-24T15:50:06.663000 -CVE-2022-40504,0,0,7c4c3ad26c457ebf695920d688182bce4e472523e396038df5e753c64836a0ce,2023-05-12T18:23:13.213000 -CVE-2022-40505,0,0,06e02c1a481d6ee8420509bf32a1281071dc3c5697db6a745bb8f626698e759f,2023-05-09T16:34:33.830000 -CVE-2022-40507,0,0,654d95c8885d5ae8c741fd1751a1cfba7089fcbb04cb498814cd0a57c71e267f,2023-06-21T15:59:21.797000 -CVE-2022-40508,0,0,82dd195f3c8d0c9bb4d9da6f8820b81095911db09b46dedd7ce46b5c97724c8b,2023-05-09T16:36:28.163000 +CVE-2022-40502,0,1,ac70ed1e89cb2e4d7324640738bb4cf8b94b8c492dd46b5a636df6e47bee76b3,2024-04-12T17:16:29.323000 +CVE-2022-40503,0,1,3b78ce0f7e38e103ead2029ff8044fccbaf0609213c28d58f79533923a346c22,2024-04-12T17:16:29.560000 +CVE-2022-40504,0,1,29b76f05c78d7845497c86850df00077eb2fc7c5e96749a44aa9a102daa3e80d,2024-04-12T17:16:29.967000 +CVE-2022-40505,0,1,ed22bdfb96cb531553328d06f1e7685fa6cfda23beef7b0c3f96616277799d79,2024-04-12T17:16:30.357000 +CVE-2022-40507,0,1,642e55fd0c4b1d2973a357b26a356ad6a1027d8447393f46a169e6e5ffb36ab2,2024-04-12T17:16:30.573000 +CVE-2022-40508,0,1,fe908c2ca6d6bf0724af9a0fae0c95894788db07590204966ce28d34a1f7fe92,2024-04-12T17:16:31.183000 CVE-2022-4051,0,0,0eb043cd7d016ceeda43431828cf0d1ba11fa38fecfa6c708a031431e78fda7b,2023-11-07T03:56:48.540000 -CVE-2022-40510,0,0,4454a3e04c941e8bd26a815babb1d9d449a5e2f2b950ae7a751c79469161b8f6,2023-08-10T17:26:55.177000 -CVE-2022-40512,0,0,73ccbed8761689fcfee7877e7ae1cbe63ad655fa12eed2c166f73ccd10574c79,2023-04-19T17:10:55.030000 -CVE-2022-40513,0,0,c52c857eff602ed4debcc04697d2f30f8f0d0ca6588778d76711e1f300bb7f98,2023-08-08T14:21:49.707000 -CVE-2022-40514,0,0,d53dfe712c5c2a81381e24bf913493d38a4269fdbdf13781973bd3c5cb8cf723,2023-04-19T17:10:55.030000 -CVE-2022-40515,0,0,b0b14222d55ce958f862fe8724da27b4d05d19a4eecf12d1d2af981224c43d26,2023-04-19T17:10:55.030000 +CVE-2022-40510,0,1,4bebc8f907b798ca49af005e5f4b6244f2035106f07a31baedcd5dce16f953d4,2024-04-12T17:16:31.470000 +CVE-2022-40512,0,1,016cc8596603d20557ca908ce91029a67f06ab6c6bc0f2f857b6ca6cf7100e0e,2024-04-12T17:16:31.980000 +CVE-2022-40513,0,1,a46231d1733fca4e32990c39cba07fdca2c5bc1b0a653eec1bb26edfd99d8911,2024-04-12T17:16:32.653000 +CVE-2022-40514,0,1,c52af5ebacf4ef0fc9ff7c0195ce9bd1ccc9e541dec044456e04d3598df4337c,2024-04-12T17:16:32.960000 +CVE-2022-40515,0,1,d5e8a1988f73185a70652ea65f91beeef07304b192951855a76d14d33ecc82e2,2024-04-12T17:16:33.537000 CVE-2022-40516,0,0,5286610bebfe8fd27ed2eb37e40f510d97b85ef08305caec33528db26ad8fcfb,2023-04-19T17:10:55.030000 CVE-2022-40517,0,0,b3919452ee18d3963f493d809dd4b196f7197029292f0de25ffc1a9e3c78bdc5,2023-01-12T20:46:58.733000 CVE-2022-40518,0,0,e9e985bd29903095516660fb5f2b9c4ad5e643700b009357a92a1492fb982dd2,2023-04-19T17:10:55.030000 CVE-2022-40519,0,0,82c695e79b43af52bcd959e7bc610d04948e17596da7fdc3b8ffec786316a5f8,2023-04-19T17:10:55.030000 CVE-2022-4052,0,0,69c89c3bfc36a58fd6dadfadcadb1d7d6de85666ab0d0184d16401be3d8064d3,2023-11-07T03:56:48.773000 CVE-2022-40520,0,0,1332df6c0b65db839c43bf3efdc563770f3ac550334aee5a217469df8a930464,2023-04-19T17:10:55.030000 -CVE-2022-40521,0,0,7c1ccc0e9ab49cecf311819e30569613c11bc00ed88bdad0f518490c8acfd347,2023-06-21T15:58:57.410000 -CVE-2022-40522,0,0,40bcb0258dd7e6168ae7e96258743aac043f95174ceaf83483072b443bb2fcc0,2023-06-10T02:07:08.483000 -CVE-2022-40523,0,0,f1b7f7623d4510c9465fc3bbaea7f56b23893710ac456c1cf3a1a4a35c06acd1,2023-06-10T02:07:15.550000 -CVE-2022-40524,0,0,00baf14801d33900a8c9517d1fddf98a7e3d6765ec3fce460fef80ed80755d47,2023-09-08T16:43:52.900000 -CVE-2022-40525,0,0,ddb137b0fd20091f46c25f7b1ffc9cc40a539f293b16af3e8490875cb11beb80,2023-06-10T02:07:22.437000 -CVE-2022-40527,0,0,4cc5385cc4fc2cee0eba055ec58ee9cc2a13b541666d20d26d2748bba060e101,2023-04-19T17:10:55.030000 -CVE-2022-40529,0,0,e4ab0885c14da59d8104c7c1a41d36a40c8d4bc7a2442209b89ad9119e654824,2023-06-10T02:07:40.433000 +CVE-2022-40521,0,1,d62368e5567a9abb74d15d436f56550abbb21353796f182fb69182e38841a436,2024-04-12T17:16:34.013000 +CVE-2022-40522,0,1,0952b655b1796df549d14e3c0ba87c086c64badfef6ed706c027fc172c903f4c,2024-04-12T17:16:34.617000 +CVE-2022-40523,0,1,cf56475f5304fbbc1913a265e222e2bd35f1492ae0e73388190e43241e6e9887,2024-04-12T17:16:34.933000 +CVE-2022-40524,0,1,e4b68d9e6d2afc8abe5f9aefa63547e6a1830d100db0780d95cea358e02b6fc1,2024-04-12T17:16:35.367000 +CVE-2022-40525,0,1,16e6f6824d0dec798936e6e82f0dc0827f9764860f3060481239f4533a27c4f7,2024-04-12T17:16:35.617000 +CVE-2022-40527,0,1,9773fe067f74f26e0e5f92f571d773a7c392ecc63443ffe3f00c5a7a5dddea0f,2024-04-12T17:16:35.840000 +CVE-2022-40529,0,1,25925418b259a86b7ac18bcb9d392d682f38b641d322f36c4b7e884ab6fcd0ea,2024-04-12T17:16:36.167000 CVE-2022-4053,0,0,6c21378289fa021b17c0eedf7ca7067753eede454421b1f947568f8305ce301e,2023-11-07T03:56:49.013000 -CVE-2022-40530,0,0,c4239116e77a0faf7f10745f49fde7726fd3c9a2a6de48697753114d1b0e3974,2023-04-19T17:10:55.030000 -CVE-2022-40531,0,0,82873314a2e44d011804477965a6b2d0de3cf3721f9e193b0b326c92746947c0,2023-04-19T17:10:55.030000 -CVE-2022-40532,0,0,c976fe8dba85b22bcaa498b327d2b3bd7de8b09f29dbd5bcd8caac67001d8853,2023-04-24T15:14:35.607000 -CVE-2022-40533,0,0,7a96c0feac3cd0ad34bbeb23e7fcffa9850a45d40c0e4f8102eb8ec3ca0bb978,2023-06-10T02:08:50.747000 -CVE-2022-40534,0,0,a385e261cabfc058c8a0ecd02dd27ca4e48518d1d36de38f4c7676efcb928a4a,2023-09-08T16:43:39.697000 -CVE-2022-40535,0,0,d3aa6b1069215b49606a37e6de51a8b996a816f6bc606a8a251cdf5f492eeca7,2023-03-16T16:46:07.287000 -CVE-2022-40536,0,0,680728a2a91f8d1edaf9376d440ba70d116ac2c6e55a542b8b55572333d7bf84,2023-06-10T02:08:58.893000 -CVE-2022-40537,0,0,04b8779e9063dc9cae7c53fa32fde8b43a24a246b3257feddfe2d727454af6d4,2023-04-19T17:10:55.030000 -CVE-2022-40538,0,0,021ac4e5e2b90b7c1d514b63f40c84a06ed365579b6e408183a3b7594c6a7c23,2023-06-10T02:09:06.670000 -CVE-2022-40539,0,0,35360ad6715927f77559dcf454cf7b8e529cdbf315ef14b77dcc64415db79fcc,2023-03-16T16:09:03.290000 +CVE-2022-40530,0,1,665d4994740af82fd5c0e92296b6def0cfc57fe6602b4e62a5d8bd8aa3ff5cbd,2024-04-12T17:16:36.617000 +CVE-2022-40531,0,1,fc7ec44a2a09c99fa5f87b6b014cb51b4058d38385303415828f5672593f1799,2024-04-12T17:16:37.077000 +CVE-2022-40532,0,1,12d5ac98430aa260d724ac72d7e4e28c82283905d73d33fb06ad0b1f3eda1424,2024-04-12T17:16:37.663000 +CVE-2022-40533,0,1,60ee7c77508842c087f01c87369429d5473046cc552467248ea9219bdea2a971,2024-04-12T17:16:38.440000 +CVE-2022-40534,0,1,e081d93ecc9f623df4b4708e7d2ffca28dc322265d2b94904562c5d592c1ff14,2024-04-12T17:16:38.813000 +CVE-2022-40535,0,1,db6e1947d97d595d2557d39a307a1dc34de0d22b124c8e1b47af184f86febf01,2024-04-12T17:16:39.090000 +CVE-2022-40536,0,1,40044f26f93148b22108b322fa663f6dced0f832d97aaf33bf8317711ebc67b4,2024-04-12T17:16:39.360000 +CVE-2022-40537,0,1,03d70398c844cbf0a2584c85ea196baef6dceab6d932d4718d578e62e0b28ba7,2024-04-12T17:16:39.620000 +CVE-2022-40538,0,1,1d483cb9533e7ee1d55e73df8c22c544b1e03e07e79f213a816e1e47ace0d2e2,2024-04-12T17:16:40.043000 +CVE-2022-40539,0,1,beb6e2f519f055916febc32c9feb5e5afd5dde5823ba406c8ce427bf916c4d85,2024-04-12T17:16:40.293000 CVE-2022-4054,0,0,5c6fc26f13609b9ba2b231b6f8bf7ddec6967d5df4c17a58cc915fcd256f0d25,2023-02-01T17:22:19.103000 -CVE-2022-40540,0,0,3a594fbef9e791009ffc0dbb79e0d572bfddcc407049b452860f79bc558be65e,2024-03-25T05:15:48.463000 +CVE-2022-40540,0,1,6bbcaf6e2304bb5734efb8c48b4fcdbe537b9146f1444fd521e28f9f0db8bfcf,2024-04-12T17:16:40.523000 CVE-2022-40541,0,0,672c175c8bc7e18e9a2fd3a60ba56ea33a3ee4966f9dc7da69a9433f724e1a26,2023-11-07T03:52:16.687000 CVE-2022-40542,0,0,ad637a710b05928e846401d03364a2bd8f1a8e193d647a249bc31baffa522b17,2023-11-07T03:52:16.917000 CVE-2022-40543,0,0,413617e35be3a9913896dd8958d8e4b960d6e1a52522d73f42d6a0ff817e449e,2023-11-07T03:52:17.157000 @@ -214856,57 +214856,57 @@ CVE-2023-2162,0,0,7943d3b0d8da27e6e8ced0655381e9264c4c0f192ffcfc24aa4e8143e879fd CVE-2023-21620,0,0,61bf2ba337868b8700ec62b079dc821044bf38a727be1255592fd89aa39fc4c6,2023-03-01T19:59:33.457000 CVE-2023-21621,0,0,0c73751878d4bf2d5fbb9dab183e0e0499b6b660cb8e35158f4f9d9e18b95b03,2023-03-01T20:02:50.620000 CVE-2023-21622,0,0,18414ab198aaea58ef6067b533d6a3af6d70abddddbf264f0b1d5e0d8a9f95a9,2023-03-01T20:04:07.983000 -CVE-2023-21624,0,0,f4bcdd67971e26dd610c0bc6ccab2a247e06c0a3da39cb0634e95fc72d463849,2023-07-10T17:27:39.443000 -CVE-2023-21625,0,0,b6afbc34cb6986a120ee45ca497b7191530cf98b8176baf1849ab116e182f040,2023-08-10T17:24:21.607000 -CVE-2023-21626,0,0,00f35f48cdf2046a697145d76a7173ecd69d32f5dc2080fe60ba87c172b3a943,2023-08-10T17:23:26.837000 -CVE-2023-21627,0,0,049aa8571dc234a57df5ac8c09f0f1e1038ddb4b601756ed66a7dee55d98e806,2023-08-10T17:20:44.040000 -CVE-2023-21628,0,0,f30ae5658e2c1eb2baf90e5147a5115491b4a7bc7be9a57fe3da77e7b90448cc,2023-06-10T02:09:10.987000 -CVE-2023-21629,0,0,b43c42f514aa64e5540a80ec526d0b9a838d6616eb7424e65fbb9362c4412834,2023-07-10T17:36:44.123000 +CVE-2023-21624,0,1,2048ce05e7284606e59cc850869d53adb75a6a7cadfda944976c7c6a2bdc902e,2024-04-12T17:16:40.783000 +CVE-2023-21625,0,1,e607902c8929d0976b01e94bb86cdc8a4541682c4132b3cff86b1e33295f4c2f,2024-04-12T17:16:41.180000 +CVE-2023-21626,0,1,3e99e193dd27efb60e3aede85afaf084d4e0ac32d97dde3d5c2a3b2b6b38fb13,2024-04-12T17:16:41.520000 +CVE-2023-21627,0,1,094897bd462c8a012b6843b7bf42aed6a59520189d62d6c55989e4a759dbfd66,2024-04-12T17:16:41.997000 +CVE-2023-21628,0,1,f0de47196d410ed3215610c0f5062748e9a3e9c9502c20fe57a03ffd501c3b36,2024-04-12T17:16:42.293000 +CVE-2023-21629,0,1,3b516017a22733b84e9bebc9d97d29f12ce9813c8485730d11ce8420dc72b93d,2024-04-12T17:16:42.710000 CVE-2023-2163,0,0,3d7614b2f45176581d89a46b7f989ecaea14b676f37e10d6b5c0ae2ae4fdb376,2023-12-15T15:48:16.843000 -CVE-2023-21630,0,0,9e0ffd9c571e7b7a523b97fe68dfc167577c56135289a22bd62fc61b7795aef9,2023-04-24T15:00:16.880000 -CVE-2023-21631,0,0,b81ca79dbfb3e90344429bc5a28a75075855bfbed6ddba4f183fae06c2494f34,2023-07-10T17:37:30.247000 -CVE-2023-21632,0,0,1e94dd3cf79a1c802cc1cc94113fbcfd05e3d0a497ded23c36821ccc4aa3c529,2023-06-10T02:09:14.953000 -CVE-2023-21633,0,0,debdf0450d9afd64a8e78d348cc7a845f8e84b3661d67ee3647e5cb127123d8c,2023-07-10T17:38:21.223000 -CVE-2023-21634,0,0,82a6783fcbc7fab3d1b16c46f34c09047e809f252e06dbc7218df98d496b5892,2023-12-11T13:09:57.307000 -CVE-2023-21635,0,0,ef77b18d10608bfba0daf859ab12f5d8d8d121040d2d982b686b696b903e7966,2023-07-10T23:27:42.030000 -CVE-2023-21636,0,0,59596b50bef980385f93fcc6dfa93b4f511cc2a3d4960e5c4bf679f2b2eb50ad,2023-09-08T16:43:04.713000 -CVE-2023-21637,0,0,ae653ef62ad2aa32bab1b5b8446028d9b3dcf7323742eb1a620cfa0c14da4f63,2023-07-10T23:31:13.807000 -CVE-2023-21638,0,0,61b3083f5a694ac96b02f29dd0b27e79295b95ab0ffde248062a1b4d221f6429,2023-07-10T23:32:10.557000 -CVE-2023-21639,0,0,ec13383d34f20b82b0554264ee3775587e028c01e64dae89e718fe9992c7adc8,2023-07-11T13:30:52.440000 +CVE-2023-21630,0,1,0c912866e7d2e169c39f12ffc5485078bf9227d84ec6a43be9297890afbf293b,2024-04-12T17:16:43.033000 +CVE-2023-21631,0,1,a5f3ef7f4b77c605b2700becdfced0ef95614635f32db8da6a10c7a1a3f37a6e,2024-04-12T17:16:43.190000 +CVE-2023-21632,0,1,014032078b5df9c364ce43f23ffec30662dc876ad78f79be7d0cf305fba14136,2024-04-12T17:16:43.513000 +CVE-2023-21633,0,1,6c9cd022b8fc06bf83912b183547b644df2579e6aa8f37c2c059ac46fd851861,2024-04-12T17:16:43.673000 +CVE-2023-21634,0,1,3075875484c94094ed275fb79ecaeb2a2f6a8d9f0c5dff6cf866a5779c301e4d,2024-04-12T16:15:08.933000 +CVE-2023-21635,0,1,22c78fbb30a208cf9d2ceb39a18999959db9ed0f3768f913d377bff3c295de39,2024-04-12T17:16:43.857000 +CVE-2023-21636,0,1,b312295632460aa7f0a179f60b0110d870c6a851e0303cc1d81289d1c02cb1b8,2024-04-12T17:16:44.023000 +CVE-2023-21637,0,1,c08a8184d70444ec6a53e1a68d97a7e9e928e20eabc8da92658c2806da3c47ce,2024-04-12T17:16:44.197000 +CVE-2023-21638,0,1,00f1451145cc675e340204e7e2cfea69421868e8dee890428287e77783bbe272,2024-04-12T17:16:44.373000 +CVE-2023-21639,0,1,3dff7567585e26461ded8bf4207ff40561d2e9a4d4bc8ba9ef5bf8e831e19166,2024-04-12T17:16:44.600000 CVE-2023-2164,0,0,117d25ceec28a2b78fbaa10eee0c3f736a12541619f738e58ca1d938087be303,2023-08-04T19:10:09.870000 -CVE-2023-21640,0,0,09ad1b81e0306dc52444be56507de9eda8648103ef7ae99b714247918840599a,2023-07-10T23:38:21.937000 -CVE-2023-21641,0,0,3d6a515388e672cd0ea44ac1680e3921ad6e8c7ee53f37b1b7edb1f8f08b320c,2023-07-11T13:45:52.017000 -CVE-2023-21642,0,0,88175c7ff6102ad26ef7f015364c65539d4bc08cbb2657093acfd3720186273d,2023-05-09T16:32:01.093000 -CVE-2023-21643,0,0,3bc21d7909922a237d740eb0ba3c6c0e113281de50d96b74df6b54f5c1eca5bd,2023-08-10T17:14:19.857000 -CVE-2023-21644,0,0,de3c09e9d0a77036d47a779bb249a40bd737cb5af0c42c84def69f14c13814be,2023-09-08T16:42:47.987000 -CVE-2023-21646,0,0,5ca6b2816ea1d1b58cf4c375f562ac7aea7a3cd99a54c63e240c4e2bb53d6367,2023-09-08T16:42:30.267000 -CVE-2023-21647,0,0,c4153a89666e966b07f9449c80fd9f092f415c80924f4e6b8c57e19cce5b58df,2023-08-10T15:49:12.090000 -CVE-2023-21648,0,0,27a739f12bce3e3caf1fd2ed8b51b2304f0954d3589097197899fded2f49cef3,2023-08-10T15:48:58.277000 -CVE-2023-21649,0,0,96d566123e36b8bf7df92368f7c7ea3c6522800933a7f879e1f5025095265c7b,2023-08-10T15:48:30.060000 -CVE-2023-21650,0,0,ca04556b68d1f23887679d6abe8b91e9763f7d8246b52cd56ddd541801cce48f,2023-08-10T15:48:22.757000 -CVE-2023-21651,0,0,d5350dc15890e05c931e5301722ddab03dd838643a8ce8238d1c07dd479e2544,2023-08-10T15:48:01.903000 -CVE-2023-21652,0,0,a03b2da39dc0522aba8e36c083c73ba3fa2620fc8a58426200d56d2330b5b198,2023-08-10T15:47:48.503000 -CVE-2023-21653,0,0,28b57f113ff0a77dffed35d5529747b127ecc3cf497c98b7b2eaafd7504a2919,2023-09-08T16:42:04.677000 -CVE-2023-21654,0,0,efba1db053751995dddf23a909921286d1c3ed5baf9742e5a0fb23ba84772ac3,2023-09-08T16:39:52.437000 -CVE-2023-21655,0,0,65ae0b4acb3f8afea6e7a6475f4a5a9406b6c69c25b5d1356671bd59fdab9573,2023-09-08T16:38:57.013000 -CVE-2023-21656,0,0,6d30d1c30a710d4411e7e09fdb79168dd6f38629998393ed754b8e90244fe8cc,2023-06-10T02:09:22.893000 -CVE-2023-21657,0,0,a5cbb6fefdf6bf5502574730adf58935536974a700f3183521dce7adb2a531cd,2023-06-10T02:09:29.850000 -CVE-2023-21658,0,0,91854935730d3d3ef558faf905c24c9f9fb759dfc52865b139a96ec2852496c9,2023-06-10T02:09:53.430000 -CVE-2023-21659,0,0,43987bdb1c7eca3c513b629247d5acde2f3b775a92b6908141ee61920fad65e6,2023-06-10T02:09:44.423000 +CVE-2023-21640,0,1,842988f7c6d1178eac1d7a3baf376e4d3c603179bbc474f4d9243d96d487300d,2024-04-12T17:16:44.853000 +CVE-2023-21641,0,1,5b7fc49c22f450b868a7b9a1a667d0f738bda40e1a75b02f386292af0f5548db,2024-04-12T17:16:45.080000 +CVE-2023-21642,0,1,1ccaaf43eea79a35fd6c3e2951c0853895123afa531cae6f630e504ae57d09ca,2024-04-12T17:16:45.337000 +CVE-2023-21643,0,1,a5cb86ea98a768718337a01e84f1f6826585b0a7a60953a8994cd48a8a1c5c2e,2024-04-12T17:16:45.587000 +CVE-2023-21644,0,1,ad9ef796c4d41b8461801620b659f053115eb410b563c93e65042df9580dedc4,2024-04-12T17:16:45.833000 +CVE-2023-21646,0,1,c6cf0f6f779d7cd1ea3eeddada602dc8f22f25c5613af2cc0fe6061dbff343e7,2024-04-12T17:16:46.063000 +CVE-2023-21647,0,1,51d574b268917e3818e77458a34ee4bba2c328ec6fbf1143fffd5f917e462c5f,2024-04-12T17:16:46.293000 +CVE-2023-21648,0,1,de629879aef916a3a8a3e73784a6be854b060488375fb3018126b3f22652fdbb,2024-04-12T17:16:46.503000 +CVE-2023-21649,0,1,35e0397522ff5f13257dda331ea1ab0a39ac3e9985990abb4fbb5add18865444,2024-04-12T17:16:46.693000 +CVE-2023-21650,0,1,cadf59a71a25a8ac4ee6361dca32330b2a2dc0373993e2bfe42f058b02f68f33,2024-04-12T17:16:46.943000 +CVE-2023-21651,0,1,e421d07502f1ae086c4154c181cb7d4fae639825366fa9619861f2e316d49c15,2024-04-12T17:16:47.207000 +CVE-2023-21652,0,1,d46b5a1bc999a030a0330eebe310d5b9ece37155d94512e5c24daaeaecee685c,2024-04-12T17:16:47.620000 +CVE-2023-21653,0,1,b386fa9ccf4aa514170415055d5cc39297060c3838cfdbe19a7e74f1897423f5,2024-04-12T17:16:47.867000 +CVE-2023-21654,0,1,cc7edcef408b1eb9c38b1421dd5ebb9836daa4b494cac0d9cc6ae05dd3cc8382,2024-04-12T17:16:48.010000 +CVE-2023-21655,0,1,9a00161f0600d53669dd90cfd35a03b08a0e4de7513fbaf3fa87349dd386e678,2024-04-12T17:16:48.177000 +CVE-2023-21656,0,1,f1e878401f9182f684121c8ebfebd9a260a834fdd1513980ad445ba04fbd6806,2024-04-12T17:16:48.340000 +CVE-2023-21657,0,1,bec7b9eaeec95cc44367f37798ddf79f10b5f6db9954656baef083e058bd100d,2024-04-12T17:16:48.560000 +CVE-2023-21658,0,1,d6f5b421d45efebdd38e7451d43b35a4564fd9c05dea5b7b374eabb489b0c2ee,2024-04-12T17:16:48.790000 +CVE-2023-21659,0,1,03ae930e3a2e31692ee24fa149b369305c5d4878896dcca850d9f920f444b82c,2024-04-12T17:16:49.053000 CVE-2023-2166,0,0,0d6ec2f5bf9ec6f5d23c39b237fc67122ebdffd337c804dd93aec3a376e157ca,2023-11-07T04:12:05.170000 -CVE-2023-21660,0,0,37add25472574209d6e9e45bee4cf4efbbc0eb3a87da6fabf79c2cebbcf84085,2023-06-10T02:09:50.523000 -CVE-2023-21661,0,0,7a55b43419cad970dcf4183c1881454b3e61066f0e5590579cb5a0b835ecd2de,2023-06-10T02:10:08.640000 -CVE-2023-21662,0,0,781070d9e154c41c5e1046ebea88fee217c1e11de480a8c608c2e6422267b802,2023-09-08T16:36:43.213000 -CVE-2023-21663,0,0,e2fba48dbb7de2c0b60fa1694bcfa351ac1e4e7936a0f1bc9f477f157ed0bd34,2023-09-08T18:01:43.490000 -CVE-2023-21664,0,0,df979567c1bea04b0e6e1b64d7668f557cf4d812cdc5eb3d92c4de6a539ea86d,2023-09-08T18:06:54.917000 -CVE-2023-21665,0,0,a77aaa29d475c17b0f51538a1e1c82d4878f123a48a0915bb1145f3a5554f93d,2023-05-31T19:15:23.380000 -CVE-2023-21666,0,0,fd9889401eab7cc76ac2459101dc5c26ce8d9026803772eaf1e71d586d17ddc1,2023-05-31T19:15:25.217000 -CVE-2023-21667,0,0,7675ad62b27fa2663eab81b2fab0a3b82e740b9cf2c438d1215a572cc216957d,2023-09-08T18:11:14.130000 -CVE-2023-21669,0,0,a60db523fe9688e4c348ee0e736bd499f58091d6c11ba6c18a6dcb38ca21ae6d,2023-06-10T02:10:13 -CVE-2023-21670,0,0,5f0686ae4968d43cfa7208e7a0a1b344cf5f204d121ed6529a2fb858b84dfabe,2023-07-04T17:15:09.397000 -CVE-2023-21671,0,0,9c234fecf8c1b8d9b9407b69f33f7cc7805f0b5bbc601de06bd6478ab2b774a8,2023-11-14T18:26:07.527000 -CVE-2023-21672,0,0,e245f5b83a0c1a18cbec4c2c9d06e74a1c1bd93886c3dcc4d07b9ee41f7dc693,2023-07-11T13:46:10.947000 -CVE-2023-21673,0,0,5853f202fdfbac878ef5b6279157c3dcac552fb072b3ba6bee4895285583e02d,2023-10-04T18:14:42.920000 +CVE-2023-21660,0,1,66caadf6f47b2b4c4697e71e23e816361e014f737b73144b29a0eff3e2af5c35,2024-04-12T17:16:49.453000 +CVE-2023-21661,0,1,1a6a8333cfb1d4eae7a420782f1c8866bddad121308f5d6c4f61f09543532ad2,2024-04-12T17:16:49.650000 +CVE-2023-21662,0,1,5475c8cbc2c0fe76ba57f59d218394bcc088847193007b1344d2217577567555,2024-04-12T17:16:49.860000 +CVE-2023-21663,0,1,40d661aaae82004b6ea17316ea5af815d12ab0b7df5c5e82fc2ec5f5501f50d2,2024-04-12T17:16:50.320000 +CVE-2023-21664,0,1,24f1ad45ebd666252239d0cdf7b6d60b33bd49a218f0542649304cc8a3f264b7,2024-04-12T17:16:50.480000 +CVE-2023-21665,0,1,32f33088239cc34d4c73314e9598bccc998af091f21cef87579d41044faf89e7,2024-04-12T17:16:50.717000 +CVE-2023-21666,0,1,30c98691f8591ffbbd3a48b8811381e37123e395f87cdac7b34b6516bf43919e,2024-04-12T17:16:51.127000 +CVE-2023-21667,0,1,385b3af60dc740a551c4256f301f2777290b4c0b090bf5a98cbc1afb407ea21e,2024-04-12T17:16:51.450000 +CVE-2023-21669,0,1,35d1f8a4f1c6b5ec0bf38a1efa952aeb34d0c35cf7b981bce5b9c2150a2115be,2024-04-12T17:16:51.647000 +CVE-2023-21670,0,1,60fac5e68ede35a7543a6718cc7130e91573a1ec58df7ad6508bc89bbb4a4f89,2024-04-12T17:16:51.843000 +CVE-2023-21671,0,1,0c4646bccad01c7867e2d34b8cdcc301123e42092e194344b8480bc2be703102,2024-04-12T17:16:52.133000 +CVE-2023-21672,0,1,5c17566b10495fc417af28dd89ed9d52f4172c7285b01320fd1fa46bc359bdd4,2024-04-12T17:16:52.340000 +CVE-2023-21673,0,1,7efb09e79544ca57879e3dfc3f72096dc44d11352624123ed711a02d25841273,2024-04-12T17:16:52.480000 CVE-2023-21674,0,0,45e4fbb8f9fbd3d4a249d874b829abd78cab45fd74c5774445baf28d5e3728e9,2023-04-27T19:15:12.790000 CVE-2023-21675,0,0,942bbdfb2a904b1e2dfbe49f56fd336da3eaf2856d6b33b1533b51fb8b98b55f,2023-04-27T19:15:12.867000 CVE-2023-21676,0,0,4bcd4fd58a0965545ca4a5d7a3f3ae15c1719886e64dc9e87f7e56c762f85671,2023-04-27T19:15:12.937000 @@ -215558,13 +215558,13 @@ CVE-2023-22378,0,0,79c8931a1b8df95d067faa3d9070071e3285cf30b5ba3fbfb08596f721213 CVE-2023-22379,0,0,44d43c7faf82154f750ae2115245d5de4d97b53dee6dc7b74ae88894e767d714,2023-11-07T04:06:52.157000 CVE-2023-22380,0,0,f80e92c186ab1f629e95e16002c99940d15a507991c117af82362f87bcb3f56c,2023-11-07T04:06:52.313000 CVE-2023-22381,0,0,a0bbd7a6c486cd0be3a8713f3193895ddbcb403d78c79650e5868162bbb54553,2023-11-07T04:06:52.397000 -CVE-2023-22382,0,0,e3d932f4668745eb55b4004a9017beef42c24c71d1f1afc40ee0134ffb90a0bf,2023-10-04T18:14:01.107000 -CVE-2023-22383,0,0,a26ba14ed8b5a73a7545e740f5c10a0a4ed37183e08b0868a11dd1f473c79707,2023-12-11T13:18:16.687000 -CVE-2023-22384,0,0,03e4648e2f7379f9fcaa035d58c18db38a3756ba33f8378e2a247ce5077c1fd2,2023-10-04T18:03:35.667000 -CVE-2023-22385,0,0,7ef9572ec9c744f9e641da9947ed209f317942cb9bb58547e6fb814f1062e67f,2023-10-04T17:53:28.580000 -CVE-2023-22386,0,0,1096e84ba7edff3d892e13c4323c5890041eb36e429128cacaff72e69540ca3d,2023-07-11T13:46:48.330000 -CVE-2023-22387,0,0,f566c1fe6ca5b045af5c87d661054c3d63797ea4efc29f1e5327bb84770617c0,2023-07-11T13:47:01.917000 -CVE-2023-22388,0,0,cc1c3003d4560ea0d636a9cf0f9dc7add7a451b5f796ef0a2ca3e976310fb0a1,2023-11-14T18:23:07.510000 +CVE-2023-22382,0,1,03739bae937dee182c39d53d5f6144fcfeade5bfe34cf19ad571943283f3a1c5,2024-04-12T17:16:52.737000 +CVE-2023-22383,0,1,86662374c5a3cec8018c254791f8f20692d1083f7aebed77706fc5d76ffdc95c,2024-04-12T16:15:09.180000 +CVE-2023-22384,0,1,7a757d0672dc0b139dd9692ce8347c2ad7ae22c1bf0a430b58eddd62cd2bc9cf,2024-04-12T17:16:52.920000 +CVE-2023-22385,0,1,a5b8480d35e5bb13be53cf24616ead11079b7951be4556de81cae968dec4fca0,2024-04-12T17:16:53.040000 +CVE-2023-22386,0,1,6e4466f0da50a9911b3b189ef6f97de2a52f061a3e30c5e4635d68d3a011926c,2024-04-12T17:16:53.380000 +CVE-2023-22387,0,1,c2d18ee4b972b197b36326fe852bed9fed62e3434617558040ba4b48446b53af,2024-04-12T17:16:53.700000 +CVE-2023-22388,0,1,ef95fe31f377da8b12449c4e2704035fe96e7e6e059c77fba17c60d5760cba5d,2024-04-12T17:16:54.123000 CVE-2023-22389,0,0,4f6ba6097eb0e3a79902e68dfa02176dded14cc7955fecd7a70e2a91083cabbe,2023-11-07T04:06:52.610000 CVE-2023-2239,0,0,3b0eb2bd79235ce1efc653a5a8e817e88f5e41f4c974be5895bb541ee7318163,2023-04-28T03:47:23.527000 CVE-2023-22390,0,0,d6ae353e8fefe93c1a2a5470a37efc508beb646de0e3af32c765bb828fa24b12,2024-02-14T15:02:01.453000 @@ -215792,9 +215792,9 @@ CVE-2023-22661,0,0,747873771aad6a33d21b331d06dcca1ac3b41b7bee3b5d859063c097158a0 CVE-2023-22663,0,0,f4dae17419ceb363d6e027bb85bd633392dc4ef576e538387ed64417d16ccf95,2023-11-17T04:13:09.210000 CVE-2023-22664,0,0,1a5aeea0da115bf26bf19e3e59cf809f57d99695518ef83a2e722f59eabfce08,2023-11-07T04:07:13.263000 CVE-2023-22665,0,0,c3f5413a699b691f7572c5a2b14e0e390a0a4a168568ad383ab69fa49313c4cf,2024-01-21T03:18:07.033000 -CVE-2023-22666,0,0,28678beaeb88b098c7b81a83ab826227267b630c0e2bd3768ff17ec785b1520d,2023-08-10T15:41:50.133000 -CVE-2023-22667,0,0,7ca663c32aaf6cf1f1a408f737afa9f5fadc09bff6f0cd2d0cefc194b9e33765,2023-07-11T13:47:11.277000 -CVE-2023-22668,0,0,626f895f4d6d3b927e5c3c4b8f0461683eefedefd84ebfc88f8582d692e41d8e,2023-12-11T13:46:03.573000 +CVE-2023-22666,0,1,d132fe6b7f81915bcf19139f5e210341e1b2168a026619e67ac84d341edcbfa4,2024-04-12T17:16:54.573000 +CVE-2023-22667,0,1,91217c2ad34e053f0fdcd6684dedab9415725f5257e86115bc4456d3ce3be529,2024-04-12T17:16:54.880000 +CVE-2023-22668,0,1,f8666c6832ee82f4d7e609c08fb7b163f8de40ff8f33b6c5692bfce9424ad4c1,2024-04-12T16:15:09.347000 CVE-2023-22669,0,0,2e8277f4b4965b1ba99ae53a71c471746520f563a2d5c009ef7a00adb97217ef,2023-04-25T16:16:53.320000 CVE-2023-2267,0,0,fc13bc21afe61ebb689b5d820863df4a61a92af16347cb24bcb4e5d2cb080604,2023-12-06T00:35:10.220000 CVE-2023-22670,0,0,8e4b3a9aea2fd630d834735b2794ba5ad8e4a94b6597c261e5b74a3dc4a56092,2023-04-24T20:13:39.207000 @@ -217436,19 +217436,19 @@ CVE-2023-2484,0,0,ea88c9d643514b7b805240f4db1eda5c3d3602520658e231ea9df493c28c96 CVE-2023-24840,0,0,a1a5af4417cb3d21935db4fa9ff6f816d7c0393cbea71bead872034b5472fb4b,2023-03-30T17:56:58.790000 CVE-2023-24841,0,0,43cb85b15298f1ffeb314149335b63c1dcbb750fc4530e4b15357c58fd423e72,2023-03-30T17:54:07.763000 CVE-2023-24842,0,0,02295967db3068e6ac0c56a8d9c191afa354057fcc269d7564ff574fcf9f560e,2023-03-30T17:52:06.980000 -CVE-2023-24843,0,0,5f9d91a0f1167306cfa1daca6c8d0a7759c16b9d6e7428f8c72acbec7bcfd132,2023-10-04T17:52:42.307000 -CVE-2023-24844,0,0,7b04b6a676767b708634e266c33728176103c126b378c5d2f903d947a3275a3e,2023-10-04T17:52:21.437000 +CVE-2023-24843,0,1,f12022d8b6fa94b43503e831b99d0c518580eba81b065694a28e05066c60ad1f,2024-04-12T17:16:55.217000 +CVE-2023-24844,0,1,9f357d363ac02d2d4c39a3848abc8a16cd561ea6d47ef76e14d20c85be118836,2024-04-12T17:16:55.410000 CVE-2023-24845,0,0,d56c655345b24f71f9c6137661f891cdb98333159f770e91e55b060a0f2dbe7a,2023-11-14T11:15:09.080000 -CVE-2023-24847,0,0,ae42c37d1796c8dcb0a180a52084ea75178e0cd6d6c8ce2c3a366a4b967768aa,2023-10-04T17:51:56.350000 -CVE-2023-24848,0,0,4ec42105938d78764172d36dbb68faddda1bcf6b303de9544814c7ae21352977,2023-10-04T17:51:31.567000 -CVE-2023-24849,0,0,ed4be51138a6946f638b910fe65e8ac2cca911922d5c626a2f718a1cec2f8496,2023-10-04T17:51:17.830000 +CVE-2023-24847,0,1,7c65e24974f1b5103b0f7650a42d6558cf0679ff20bb0aa174dc5f4071873138,2024-04-12T17:16:55.590000 +CVE-2023-24848,0,1,ec59b6613c8d79b7e7767e60f77b1ee021554c6608e599ec52551aa1b0a55639,2024-04-12T17:16:56.693000 +CVE-2023-24849,0,1,f810d78c3f7bbdb11e0b5c6241253027a80dd0004eae1d126e341a40daac486e,2024-04-12T17:16:57.317000 CVE-2023-2485,0,0,47887f02a37745c363d36e18480aa44e2300a7cc56adb0adc11c3a4b90be7a50,2023-06-14T02:02:01.997000 -CVE-2023-24850,0,0,1e1b4de3ecd57659315db5ffc664ddf49aa4b5bdb418c71fc8f8358b5967752c,2023-10-04T17:51:03.337000 -CVE-2023-24851,0,0,ae5ed68651a95124f2df1b268012996b8d2e4e5747f140615a982bb54abcbed9,2023-07-11T13:47:21.847000 -CVE-2023-24852,0,0,1416080f2b35fd2d66fa226c106520807b8d0f81ffd84c2878197edc20fd9332,2023-11-14T18:21:51.557000 -CVE-2023-24853,0,0,f619988899b86de15070786da3a78e61961d5165271a71ef8be3042ea67e69f8,2023-10-04T19:56:41.367000 -CVE-2023-24854,0,0,6dfac264c04da9c34269f7d0c53a090d2fefe41b950820db1e3d21275976ef37,2023-07-11T13:47:45.033000 -CVE-2023-24855,0,0,0375cecf361bdf9d2057689d28cb6d1cb9533df6b0dd5574095ee2cfe94265f4,2023-10-04T19:56:08.360000 +CVE-2023-24850,0,1,d67e09f67d8aa6ae895208d2e2bc0a76956db06a16920097b163de1b64e88837,2024-04-12T17:16:57.893000 +CVE-2023-24851,0,1,74220046ab78ca8c6a503ddd7f862f1b92a05fc12ee29dbd9935a594ae51020e,2024-04-12T17:16:58.240000 +CVE-2023-24852,0,1,1f30ef38460810b8a79f7433a5d310fcae54cb811a26192038f4b2c87934eb34,2024-04-12T17:16:58.613000 +CVE-2023-24853,0,1,79fcae388846c51b8e3a0269678fc10cbf14503caa8e88de987b013af035b602,2024-04-12T17:16:59.013000 +CVE-2023-24854,0,1,124d5c0ce46fab127ea2726ad11f149cdd499d3fabe36819248768f09a4382fc,2024-04-12T17:16:59.807000 +CVE-2023-24855,0,1,bac39aff8453e63ab6cf58efe8e80486be150babb209bfc1a62270fb53d7f800,2024-04-12T17:17:00.080000 CVE-2023-24856,0,0,9181e8bd519dc950c3a9495839a8df9e9f3725d8d151c758efa72d316a87f1b1,2023-06-17T01:15:40.860000 CVE-2023-24857,0,0,a8e70912b5cf270fdcec0f748986ec59d55a51e057892cc8fd1ad340ca607aac,2023-05-08T16:45:07.950000 CVE-2023-24858,0,0,4a25c2002cdaf095b9b2eedd03c279e5f68dc479dce85bc9493a011e7af6bd6a,2023-04-27T19:15:19.270000 @@ -220369,62 +220369,62 @@ CVE-2023-28531,0,0,1cecf2379a08d123af4538e9a846573981148715889dd212df368fe533587 CVE-2023-28533,0,0,02dae74f75870720356ac0e71a1e5f83afd1dddc568f6288dcb5524fbee75b31,2023-08-22T00:55:00.590000 CVE-2023-28534,0,0,4c4869d45549af4409929ae4ec9a35fa51a0bfe16e9da1455f67587ee9dbd774,2023-06-28T07:09:04.957000 CVE-2023-28535,0,0,ca3aa0c5b9a2c8d90d0d5555bf25353f79a5fa541d80f981c5a5ec60f20d19d9,2023-08-18T03:19:13.633000 -CVE-2023-28537,0,0,4f14925e77bef9bd2ae3842d90bbf6361ff886c0a53b75dd982645d1f403d89f,2023-08-10T18:18:17.920000 -CVE-2023-28538,0,0,c6bda0c44a3036d1d514c396821bf31414455280f7381b649c14f2d0afebd8b0,2023-09-11T13:02:29.710000 -CVE-2023-28539,0,0,1e229db65159e207cf2c22b4ca85a862e4113e167d7c3358ca0cf3615a3357aa,2023-10-04T19:55:39.053000 +CVE-2023-28537,0,1,daa234594eb29579432142e77125e7a745a2864d97814a1345040a028121346f,2024-04-12T17:17:00.537000 +CVE-2023-28538,0,1,b2c49f29489af9f01ad696066ce53e4140d0841af63787c19059b162d8d65e1c,2024-04-12T17:17:00.820000 +CVE-2023-28539,0,1,d1c16df0dacaf229490d7ad38133d6fe5a82a8dd1155c63635d160045e29a63a,2024-04-12T17:17:01.060000 CVE-2023-2854,0,0,f2b2f250cd9dbba7042e8e797f67f091bb432bc5aacdf05f544ca6eb3fa33a95,2023-10-20T18:07:51.753000 -CVE-2023-28540,0,0,025c28f471baeebf7c54a7fa9de943facea63414f30f0303f9c3878b4c939157,2023-10-04T17:50:30.540000 -CVE-2023-28541,0,0,c40dbec2ea1d0f6d04d8301124495d16d9cc19da61decfbbf0eb4549b8dd993d,2023-07-11T13:48:01.567000 -CVE-2023-28542,0,0,1b647bf230a4b21ccfa7b308663e12c711e653b243408cb1d3ee90b4c08fac84,2023-07-11T11:43:07.723000 -CVE-2023-28543,0,0,72923968fb58f7d93b08c9388fb3cd6b26cf750253768741122f2710986719d7,2023-09-08T18:16:21.503000 -CVE-2023-28544,0,0,5d0584dd224ef1189b34911bc79e1be487f444efbc1b7e64a8c32c274f47324a,2023-09-11T17:08:00.573000 -CVE-2023-28545,0,0,40a76029c861636682ef7ae4415286554c5dc5d1d415be0be9a6356a5ebdaf77,2023-11-14T18:21:09.870000 -CVE-2023-28546,0,0,ad8c28921a0e29e9b00929b11bb24a5388c6d1ce1e1e67637f3eca6f98e16180,2023-12-11T13:53:48.177000 +CVE-2023-28540,0,1,5e6c539e8b7cbe9e1e71eac308d11ab6e9bcd3c3712437cd551dae5288f0fe6c,2024-04-12T17:17:01.300000 +CVE-2023-28541,0,1,a09a3854ce40198e83ba5af7b3194c03b1a568a31e35afae3419384409334e9b,2024-04-12T17:17:01.593000 +CVE-2023-28542,0,1,0b7a0b9f9115ba0a42c68f493bd8dda3f2c7b79820a6e555b4fa82b78ff8a5e2,2024-04-12T17:17:01.933000 +CVE-2023-28543,0,1,b9f0b37ac416ef2ec65bf434ad8e9f7fac7e6372df35588a47b41e8d69fafe6f,2024-04-12T17:17:02.233000 +CVE-2023-28544,0,1,9f82e51165e4f9715d1848f20c08604a1e4046394a5ed01963701e6f8eb639f4,2024-04-12T17:17:02.397000 +CVE-2023-28545,0,1,99b9a96bea3e4d69b6c2cf3a361d68e3b4f87519c8ad6313226a18a3f11a499a,2024-04-12T17:17:02.750000 +CVE-2023-28546,0,1,4ecd0744614414dccf3d20625a10668d812b077a7d13cc6c3d95569622a2c7af,2024-04-12T16:15:09.513000 CVE-2023-28547,0,0,22a05a863516330e9528fe63848355d451e2945068a37757d59c2cc46d2cfe3c,2024-04-12T09:15:08.583000 -CVE-2023-28548,0,0,f7c65cf4601fd278066a8df4b8fe1480d31811bc1d91aaef6f8cd5c349beb4e3,2023-09-11T17:05:04.900000 -CVE-2023-28549,0,0,104748ea20a39c69181d62c49c65b6f63168cecd1707c0e987c1a9d810449073,2023-09-11T16:58:23.583000 +CVE-2023-28548,0,1,26c2e52ca584583fb9ff4a33a89bdfc78322ebdb7ee3d675af4ca117afbd6287,2024-04-12T17:17:03.130000 +CVE-2023-28549,0,1,0a2d8cbadb60e1aa7a381add13bd1979b7f1521f4f700bee41b1cf9326a0057d,2024-04-12T17:17:03.490000 CVE-2023-2855,0,0,c986b97ae97c10f4cd8e8e1aaf7af701e5f468795353062853415fd1eb066a1e,2023-10-20T18:02:30.760000 -CVE-2023-28550,0,0,65e928b78a88e52da1d4b7fa98d5605efaaab914025b61bc97e0a43088b695a9,2023-12-11T14:21:12.367000 -CVE-2023-28551,0,0,be9c032d9cef156e3b86ff21eafb9f6378ba0eb24148e92f092a8094399cd7cd,2023-12-11T20:15:54.523000 -CVE-2023-28553,0,0,673b21d5a2f977937c95ce4500a603def6f6a67a8e82bf7e901ebea6554dc357,2023-11-14T18:20:26.560000 -CVE-2023-28554,0,0,dad5c16f743e931f2ce442e66ab192af041b0edcb2f605a26f6edaac9e0e6ab1,2023-11-14T18:20:07.357000 -CVE-2023-28555,0,0,2bec8ab426b12712c80e339558b4b61bec3c2998426bb447f8da288b9299b349,2023-08-10T18:17:57.923000 -CVE-2023-28556,0,0,8c1ca8aa960282ae856b18438a5b8687aff4cb2e49c32dc9ee5bb6c6506f2bb0,2023-11-14T18:19:44.400000 -CVE-2023-28557,0,0,285c58f68f01d9dc353be97bfa8f313687d631b1f19c1cbd2262e818e540d14c,2023-09-11T16:57:21.930000 -CVE-2023-28558,0,0,4d33da9cbf128a99162acd2967d91e765e2de2c958352963fbd3a0f2632f9f06,2023-09-09T00:05:38.137000 -CVE-2023-28559,0,0,6be252b5c3abdd7065854d5a48a2f564bcefca929565b979dd1292f2720d8eb8,2023-09-08T18:29:43.513000 +CVE-2023-28550,0,1,8c9b20e2eb60a23791c843d11504fed0b2396bea8607c0d79249ec2468357259,2024-04-12T16:15:10.073000 +CVE-2023-28551,0,1,e65e2a614dcdd3da6a036f4724c38264a12f7634b3292d7864719a9baab4c10d,2024-04-12T16:15:10.583000 +CVE-2023-28553,0,1,827b6ac1a732141be2f2101761d3d2a34540b1d88bf0f6e4a63ec1eddcc116af,2024-04-12T17:17:03.977000 +CVE-2023-28554,0,1,255895fce4faf8c42c9f23867c5bdca11be56e6d404cbac0f1601dfe8ac3e155,2024-04-12T17:17:04.367000 +CVE-2023-28555,0,1,e529b06f0dc573e2a0b69ee2df492cb477ca34638e557b005a85193075a8c1e2,2024-04-12T17:17:04.750000 +CVE-2023-28556,0,1,eb6dd24640d0e55926ed6b33760670eb1e5e8845ead4d916797c1afd1a06360a,2024-04-12T17:17:04.970000 +CVE-2023-28557,0,1,85a8e8f8362cc4780db80a07976efdb358a3f4d3970a8aabde1c8bd79de485d0,2024-04-12T17:17:05.403000 +CVE-2023-28558,0,1,8aae966886c5ae495c5a563beea981c63972e468c8bb3be1af6602cc96c44832,2024-04-12T17:17:05.803000 +CVE-2023-28559,0,1,e566b6419c316876c8861ab0a832df5d24e252091a78f775dc8084261e642db1,2024-04-12T17:17:06.163000 CVE-2023-2856,0,0,a56976fd1b96662d4ea0beba75ac2e2377365cae4a4ef473e39ad50bf62f35f4,2023-10-20T17:53:32.420000 -CVE-2023-28560,0,0,a879c59c1856e80991addc2157209c298f6d04fc6e986091d701bd00d383510d,2023-09-12T19:46:13.190000 -CVE-2023-28561,0,0,8cd1774e38bd6e1c8dcf197db0f61911b90f4c359b239f191d38d126b7abbb85,2023-08-10T18:17:34.263000 -CVE-2023-28562,0,0,390f74832121dfdbbf32fdd62841f5ac61d9055722e8ce7b692a4e193697a0a3,2023-09-08T18:20:26.257000 -CVE-2023-28563,0,0,32ca91f872f46f04b609f6ff67d54fba030e3a796e27e85437fcf36365468077,2023-11-14T18:15:17.510000 -CVE-2023-28564,0,0,beb647a4c3f83a57ce797bbb7ec8b6868b68f3b380f1c62ab14414483fbfd334,2023-09-09T00:01:04.990000 -CVE-2023-28565,0,0,8ba91764b037d07eaf84e3ab8854a2a4a304614832649067589cb64fc0937012,2023-09-09T00:00:03.907000 -CVE-2023-28566,0,0,7df73aa38ee958727269bf743aa059c06ddbdc84877599115738ab566dad4446,2023-11-14T18:07:17.730000 -CVE-2023-28567,0,0,b5aadd616839f2c7a580c0ca7b0145987bc81b5b5a2cd9912f171f3e636f64cd,2023-09-08T18:41:43.067000 -CVE-2023-28568,0,0,a93c960aae67ed36f61b36d24396f6b0bcc7e94684121194b2d201450d84b25d,2023-11-14T18:06:38.107000 -CVE-2023-28569,0,0,3f0c945cebe21542218469179f8d783cc5693317e79fb20c476680a95770cb8b,2023-11-14T18:57:56.427000 +CVE-2023-28560,0,1,860fe0d067e79c78cc57c70da5bd35a0e44cc266e61dc9870592a0e4c900aaee,2024-04-12T17:17:06.503000 +CVE-2023-28561,0,1,f0a79abbd62a95a5c9bb2b1712cf8849e699a5ae43e8854b6da048c0e242fdee,2024-04-12T17:17:06.900000 +CVE-2023-28562,0,1,224d5688da9619aa9350118927287240778e02a4b7a781acf8784ab77c4afe38,2024-04-12T17:17:07.090000 +CVE-2023-28563,0,1,879efafb3509d2b6421f00d8415a578fceff63ee3894e1b0268b335cb06eac00,2024-04-12T17:17:07.250000 +CVE-2023-28564,0,1,f8e1e7eef1d0bf6ca4f2a8142b1faa6f7e9fc45985374e3f1f1dba02c8ae2c8e,2024-04-12T17:17:07.573000 +CVE-2023-28565,0,1,4c59ee4a5c6f4f9e7f40fbe27069353ade6bde1e09d8e9dc04fc79af04f23247,2024-04-12T17:17:07.970000 +CVE-2023-28566,0,1,e3b8f697bc5db01dc9c7e782166166f6feb89bc2b64e8a81e1c4b2b07dcebdd6,2024-04-12T17:17:08.377000 +CVE-2023-28567,0,1,feab5f3463ff53540d30662f2b998939e792c607d4b4651837deb1afc4535307,2024-04-12T17:17:08.633000 +CVE-2023-28568,0,1,f269fefda9568c20c5a74f8717d3a6cbb301a11e937945a79e6dbad8e41766c8,2024-04-12T17:17:09.043000 +CVE-2023-28569,0,1,ce78b4746099ad5911929b09479c40585791836064e0dc562304661dc3a0686d,2024-04-12T17:17:09.250000 CVE-2023-2857,0,0,c2276e5bc5dc87182f267629981a0d4b5e9daba13b1c06ad478cec9af7fc8012,2023-10-20T17:53:17.220000 -CVE-2023-28570,0,0,c8d8b8745107fac93ab31b8da07762756aecaed14280e4491ff6e780495c142f,2023-11-14T18:57:32.993000 -CVE-2023-28571,0,0,46113f119e39d5626fd0392e1abaf1586577a60c418c055e6eb5121e85e66363,2023-10-04T19:55:13.527000 -CVE-2023-28572,0,0,5243833ef8fbd7d278e45a81fdad571f21d2394584b9988f6c1ce731e8f2d8a0,2023-11-14T18:57:00.267000 -CVE-2023-28573,0,0,f29971208c52d0f6ef8aa355e0fc7a4dd631ed45d502e938c2de296421afa25d,2023-09-08T18:39:01.407000 -CVE-2023-28574,0,0,fec8c69abbace8acc25e05aebafc9c11eea48c897e01f166b6a84d95f13df89c,2023-11-14T18:56:24.250000 -CVE-2023-28575,0,0,eb3385a9081f83e7fc221ff6106b1e399b03ef78bacebbbdb9a46f4118838ffd,2023-08-15T15:56:24.943000 -CVE-2023-28576,0,0,33e152a02b44ef98018f9ce151782fd11db09fd196245c842168643c0572478b,2023-08-15T16:24:42.893000 -CVE-2023-28577,0,0,fcb43838a680e3e964d99b3291eb982d962f0c8dc6252aaf112af1790f40dd7c,2023-08-15T13:43:28.633000 -CVE-2023-28578,0,1,e8becc6276f80d4eeb9045235d4f23d9b6432fbc68e03a7087d19ade2d6c1438,2024-04-12T15:15:20.100000 -CVE-2023-28579,0,0,a8d30d5c3b373417d2a4cb3a0bc3e84c7beb0bf3d2767197eda0e0ba26dc0467,2023-12-11T14:51:58.197000 +CVE-2023-28570,0,1,367a6680f650f97cbfd02d4cf5447edc991e2e55475fa660dba9b29268243e51,2024-04-12T17:17:09.900000 +CVE-2023-28571,0,1,bee3283567201a7dccaeb7b2bab1c8aa138f7484ae99497a5f85c2fc69aa995b,2024-04-12T17:17:10.120000 +CVE-2023-28572,0,1,8b454527f7de1f67e46638a81b2bbbc793aecc3046ec63a9d9c894cf772f3ba6,2024-04-12T17:17:10.347000 +CVE-2023-28573,0,1,1a7913f72aa0fc5f9052444c75aa4d8fa24cfd689168709efb0acf25ded8d7a5,2024-04-12T17:17:10.607000 +CVE-2023-28574,0,1,c8ab81987e710fc7ddf4fd2fafe38ae13bbc03b8ae025a177973b334a6477c58,2024-04-12T17:17:11.043000 +CVE-2023-28575,0,1,5cb23216cd767c431bb6790ab484c5b382d596da583afbef3269a6687ac645d7,2024-04-12T17:17:11.323000 +CVE-2023-28576,0,1,ecd5b78821c5fc3c23d142d813fb91b0e066a3373cdc3f1f7d60b53f93296fec,2024-04-12T17:17:11.607000 +CVE-2023-28577,0,1,1e98f61c9b962b2814f45959cf74ab51092348b40ced2ee7d2c8404fdce533c8,2024-04-12T17:17:11.860000 +CVE-2023-28578,0,0,e8becc6276f80d4eeb9045235d4f23d9b6432fbc68e03a7087d19ade2d6c1438,2024-04-12T15:15:20.100000 +CVE-2023-28579,0,1,fb9d7aa2705c1877ab6646c85cea494671c6ead35fcabe1e82a8a73f36a3406e,2024-04-12T16:15:10.907000 CVE-2023-2858,0,0,65b981c0fb0f36d4401e7fb44ea4eba3b0383cb90758367c3effcea7fcd0b5b4,2023-10-20T17:52:55.287000 -CVE-2023-28580,0,0,583281d9bcf501398d0a10c4511e62d940b4f1f982f599e7319e5eb0f63f215f,2023-12-12T16:52:17.877000 -CVE-2023-28581,0,0,91aa07d360455e07df3de21efe71dd54cb02e712562ca4adcd33b4ccd3d72952,2023-09-08T18:32:42.107000 -CVE-2023-28582,0,1,1b505084cd682e63c189469a2f1fb7fff115e388a0ef96378c195971ba667362,2024-04-12T15:15:20.317000 -CVE-2023-28583,0,0,2ffe055f4d30438ad85e70d588746c9d9e7a81c602a96b03445854fc01981c0e,2024-01-08T17:48:54.100000 -CVE-2023-28584,0,0,769502394154fb538c912635ddf8bd82c4dbb80fd4e298198a3e4c57a824e053,2023-09-08T23:32:56.167000 -CVE-2023-28585,0,0,2e40bc00e5ab2dae5a75e2a3ddeea4e0ed79db8679d3e1ffedab25c6e0a275d0,2023-12-12T16:16:10.227000 -CVE-2023-28586,0,0,740504e507c43f5b1467ed64cf78fb736a23a0f7bf3dd9a081a9bf8105922748,2023-12-12T16:11:28.417000 -CVE-2023-28587,0,0,9c656717c85e9dc82906e2ec953b56b207dcd4789193059d3d8d3793ef39e484,2023-12-12T16:52:13.027000 -CVE-2023-28588,0,0,965c8225ee75e066c6205af75353134b07b6c2c85e3a480f9666f1ddd646e5d5,2023-12-12T17:00:54.277000 +CVE-2023-28580,0,1,0bd0062b9d73921825aaacaa12983d76f0c1281f58103f43ad5f955eca178e7e,2024-04-12T16:15:11.110000 +CVE-2023-28581,0,1,ad03586c15a2cdcdad5c3e15d0cc984ec466af8a39ff34e71ccabafb26032819,2024-04-12T17:17:12.083000 +CVE-2023-28582,0,0,1b505084cd682e63c189469a2f1fb7fff115e388a0ef96378c195971ba667362,2024-04-12T15:15:20.317000 +CVE-2023-28583,0,1,3fc35bdda4523880f6199204aa8ea5c7ab7cd2c55d3fdd0c081e40a1ed245918,2024-04-12T16:15:11.243000 +CVE-2023-28584,0,1,4179c3b3e4e5dea0aee758d5690802eaaf00b999dfeba30ca0f84d4180afda26,2024-04-12T17:17:12.277000 +CVE-2023-28585,0,1,c9d9fdb9e30ce8fd1b2e252b2161552a1307e1cbb9062befa20436554944f60d,2024-04-12T16:15:11.403000 +CVE-2023-28586,0,1,6ba76a73375b1853286abdda389fc24c33e2db5350beb4db1921957fba27dd6d,2024-04-12T16:15:11.777000 +CVE-2023-28587,0,1,96c800ca75f95fcbc67d4b516eb4823682acf09d16fcc14cbbcc51294617028b,2024-04-12T16:15:12.210000 +CVE-2023-28588,0,1,fbe901a0f8f7dd689b8f0f96fb4feb87d6ea66ef558e4fa81d76b9485b86be42,2024-04-12T16:15:12.540000 CVE-2023-2859,0,0,e009e54d70616a802b8cbcb17c00a73b3b7f2fe477fda18521c9a0262965b54e,2023-05-30T17:11:43.767000 CVE-2023-28596,0,0,844b487e27f9306aa7dd1a1594528a65d9e3da19c25024ca3a7c00d2f94a32df,2023-04-03T17:25:48.803000 CVE-2023-28597,0,0,fdaf1df3b7d59135531fd8421a694ec9b1c58e51c29f37981fa8333dee43728f,2023-04-03T14:22:09.760000 @@ -223695,115 +223695,115 @@ CVE-2023-33010,0,0,fdd0f773cdeea0174993e03c2bd1331e5a31040f723d6caaf2a52534eb4db CVE-2023-33011,0,0,a38d4ab640e53685b3e0ae6da2fa78110ed4e36bf49e5edb8c3553803a8b4222,2023-07-26T21:35:45 CVE-2023-33012,0,0,b25a05b66076b833aedd5f205a323175dcc9c34bdc3cdf18622aaf5fe3eba024,2023-07-26T21:35:28.507000 CVE-2023-33013,0,0,2e21ec08413404a64fa9fc203e0926d7c5cf20722e30ed1220d85b281f3bcd75,2023-08-22T15:56:05.847000 -CVE-2023-33014,0,0,2494a4e38be56d6f3b630adbe57ec9a5715853d6c15ba7235cbd112538bd6193,2024-02-16T20:46:08.317000 -CVE-2023-33015,0,0,2c4ff3267f0226cc034f2d4b167c4da5b2c04a3282f19d696e85742b75103bb3,2023-09-08T23:27:37.453000 -CVE-2023-33016,0,0,15995a6625fb6bfc15d4df0903d6decf0713579173ebe1b9ae8ad626e154b0ab,2023-09-08T23:14:37.230000 -CVE-2023-33017,0,0,a585056e60048b391088a078bca8c08acbbd6c4fa775a30a8a2c0a5713a04210,2023-12-11T17:49:10.307000 -CVE-2023-33018,0,0,1809fc1dd873b5d31388f5c22139054b1471adbd12dd8c720c4231a50ea177ef,2023-12-11T17:49:48.960000 -CVE-2023-33019,0,0,f32ffe5cc55fd09d98ab6baff61dc0f1078766915915dcb50cbf08d7351d8266,2023-09-08T23:04:18.557000 +CVE-2023-33014,0,1,d645fcc98ad00851d79c90132d48dbb1edb37a734850f1411c61704cad5f9375,2024-04-12T16:15:12.833000 +CVE-2023-33015,0,1,d89c1a2031d74efab0faf70f8c4f8788f985fd4cea865215a1c717ccc8286d4e,2024-04-12T17:17:12.467000 +CVE-2023-33016,0,1,8466b5cfb5ed9ab4e9da88700843f78f4457b881d6b933c5861db6c728346266,2024-04-12T17:17:14.697000 +CVE-2023-33017,0,1,d0b6aa564359e3c4cc349cda7cf145d889c42a45b984f0189a5e73ff07dcde4a,2024-04-12T16:15:13.007000 +CVE-2023-33018,0,1,736ca7f768919ab225e1ac93ccb6a0ce07eb9f4e006c71811bd5b25392067f42,2024-04-12T16:15:13.430000 +CVE-2023-33019,0,1,8247ca7879b9edb21a8af8e67be2fea253a8ac2f7d1292443902dd19596b6ac0,2024-04-12T17:17:15.060000 CVE-2023-3302,0,0,132b05922db0a78b39d95bf528d6259026355fb54b82fd95048a5315abcfa5e5,2023-06-29T13:30:44.040000 -CVE-2023-33020,0,0,b3a2be6ffe54498647bd663d93aa19d3bcbf24036b1e38dc4b1db628212b85eb,2023-09-08T16:46:27.047000 -CVE-2023-33021,0,0,a2a491f10962a0cb0dcf6895ca2eb70aafcbb3f7f8375f8edcdeff20126240fa,2023-09-08T16:47:15.713000 -CVE-2023-33022,0,0,33b34cf51e731a9fd79e2deb6a9fbd02e01fb5734254466bc9e5413ae7f23fd4,2023-12-11T17:50:30.010000 +CVE-2023-33020,0,1,296eec4a10ad762d82276f9200f88c9a17273dde7c55dbf6ea17054a6e3889ce,2024-04-12T17:17:15.340000 +CVE-2023-33021,0,1,b1e7d80cc6f8a4b40ffba93964d88815f9f1a063bbb22067901bb02de5468d0f,2024-04-12T17:17:15.697000 +CVE-2023-33022,0,1,2596f3f60a0ca75cd1b56b161946e27b0c7077159cd10a1857a7e9df06f99c22,2024-04-12T16:15:13.993000 CVE-2023-33023,0,0,12e6899cd63837b2e22c7f9ee87e0653fe0311a0d2d94f5f303fdec8c58b54f9,2024-04-12T09:15:08.740000 -CVE-2023-33024,0,0,15f885c6a95d4cb7eb5d81035f07c216e079b3bd9db19e813115c92e8d7867b2,2023-12-11T17:51:28.897000 -CVE-2023-33025,0,0,5a8013edd285230cdbaa919ed23f99d49124480201f3e9ee677fa7aa3300efc3,2024-01-08T18:40:01.160000 -CVE-2023-33026,0,0,f247ad38f150bd63974dad2a35279f20f1722e7ce7a20457c3802722e5233a50,2023-10-04T19:54:35.327000 -CVE-2023-33027,0,0,b840a86005491cd14239aaa5c745d4b92368c50b5cf8fb89eccf028937394e5b,2023-10-05T15:33:11.150000 -CVE-2023-33028,0,0,7e7675a826823541f518de4b35cf2a9b0b3fa091089f7fddce1a6a91afe3f76f,2023-10-05T15:28:33.267000 -CVE-2023-33029,0,0,df0e2fbceb658ffd9b2afc0ae0934c18c505b705d865da38fcbc08e040fd2d52,2023-10-05T15:28:09.890000 +CVE-2023-33024,0,1,5993a963e82cd945397a825218f1f7c8693d54483f477488739b92d8d1a6d28e,2024-04-12T16:15:14.403000 +CVE-2023-33025,0,1,29296836c69aefcd1d5e475165c8d918e5b18cd953651fc114fbe04e191fda00,2024-04-12T16:15:14.690000 +CVE-2023-33026,0,1,38374143e8f717e9c68c19fd8f795d6432be2321a9370a37cb4dcef1a5e6fb63,2024-04-12T17:17:16.077000 +CVE-2023-33027,0,1,49592dcb27d4e8ae753d7f1d983b1f69df74e7a12ed88de95dabe5ab8a783388,2024-04-12T17:17:16.477000 +CVE-2023-33028,0,1,63f0cd6c0d8fd408ac1f16e5b66ea909858112a96e6b43909d4a1283769048fd,2024-04-12T17:17:16.987000 +CVE-2023-33029,0,1,47d0eeb70f544e6c57c3a3eab402935e6c5b320f2024cca94b508997d911a8aa,2024-04-12T17:17:17.357000 CVE-2023-3303,0,0,217de72a70192f38b1953a7fd08cdcd8a83bfc45539d1147a083cfb11373f609,2023-06-28T15:19:14.713000 -CVE-2023-33030,0,0,95eab47965d8c18ad6088a3ad346641fce0beaabccad3a7da7b4c6476dec20f8,2024-01-09T19:03:15.717000 -CVE-2023-33031,0,0,6c3a890d10da2d3ee92406c8e88ad61e7abd1c7c1fd45ef3e043ab2b2fe490c7,2023-11-14T18:55:30.877000 -CVE-2023-33032,0,0,c76cd9ebf27277bb6ac5a07bab13d6b3bf1fb66ea828d48d698b6ae33d9cb948,2024-01-09T15:18:49.570000 -CVE-2023-33033,0,0,49c210b8a57ed67934a409dc40f44adf8d37268582e59d5c23faa67842f09de0,2024-01-09T15:28:54.313000 -CVE-2023-33034,0,0,a7b73ba3073646d6a53155853fc4b74eb77acb918372f2ab04dcffa31c1edd9f,2023-10-05T15:15:46.267000 -CVE-2023-33035,0,0,75e0c6fbf2aa7a0d2a6d042a651b2986a70eef787c1d12f2a155acc02edca5d0,2023-10-05T16:21:44.783000 -CVE-2023-33036,0,0,868c5b04b11d6606ca1f443934f22deee2304b09f2da03158855d998b3978744,2024-01-08T18:40:51.257000 -CVE-2023-33037,0,0,1652bfaf947edf976290073ae236c53a557c93b6c6b0ebd7ad36b275cf42fb58,2024-01-09T19:12:53.033000 -CVE-2023-33038,0,0,9f6126cf181d447b5aed9b40a1fa6599cd622300c30c15d050025ea8826e6f39,2024-01-09T19:14:32.847000 -CVE-2023-33039,0,0,8d423219ee8039a6ec23e95fb8bd818680f3ccc84121f3ac12637b50d935a285,2023-10-04T21:18:51.943000 +CVE-2023-33030,0,1,d57b72a6f383a95ff48e512beeab812a90bbaeee73713ad3c72220375560c294,2024-04-12T16:15:14.880000 +CVE-2023-33031,0,1,ae2d9b18ea0f0d532d28433b505bb3be6f6611edbfd07cacad3ff903988847af,2024-04-12T17:17:17.647000 +CVE-2023-33032,0,1,6847ecb88523efdd526f3cb3ed9c87982c44a8322a74b0e22f5ef79fd4a5d0f3,2024-04-12T16:15:15.460000 +CVE-2023-33033,0,1,3d7bc2ebb7a44ef59174dbec328d0128094eb9888228fb8c6c5364fce330281b,2024-04-12T16:15:15.820000 +CVE-2023-33034,0,1,fe06dfb841bbcfcc12542918fa89f081dd8d671aeafb4534ab3410eea5a14d74,2024-04-12T17:17:17.983000 +CVE-2023-33035,0,1,bfda2664a900a91b5a760fb60ef56045fd172f4b00f865ef5e93b937bf14be34,2024-04-12T17:17:18.170000 +CVE-2023-33036,0,1,2de6aed86a11076e1d44eb54a285f881af240ad154d85ec2ec503e548c835989,2024-04-12T16:15:16.220000 +CVE-2023-33037,0,1,0117f27aef543ec8ba26999914b9fa4b52b8b3719d6325faff6a516632be0cce,2024-04-12T16:15:16.440000 +CVE-2023-33038,0,1,f14f7deeece8050aa109b510c35ae5efb38f4f9a92e10c5f2e91637dd2ddc54f,2024-04-12T16:15:16.643000 +CVE-2023-33039,0,1,9e870b67a6e03ac97670f7089d59e81934cb3a901fe9444757e3c2d7b601c2b8,2024-04-12T17:17:18.543000 CVE-2023-3304,0,0,03c9706ebac80a89f17e582088f24a055c414925dfaf8f500690c250d820a9f2,2023-06-28T15:21:27.977000 -CVE-2023-33040,0,0,1e0b726b1d878b4f211b8cf2628267f025eb784a738d28be1175a2d299e1e36b,2024-01-09T19:14:51.203000 -CVE-2023-33041,0,0,8e54d1fec2b9de11bb655e27edd5125437fc9b9f10ed5aef5a8dbb47b337608c,2023-12-11T17:52:30.027000 -CVE-2023-33042,0,0,9679cdb6a2171f22805ef579620dc32a5654d96da48093908e72db4923be472c,2023-12-11T17:53:27.723000 -CVE-2023-33043,0,0,e8c6bed81f2e70a0bf87e1ff5f51180f70d28a1b449747891c3476896672c49c,2023-12-11T17:54:32.727000 -CVE-2023-33044,0,0,0228036b6554183db8209d4048f2e9bbfcda9b554f0569f00c86561ea0abc27c,2023-12-11T18:03:59.473000 -CVE-2023-33045,0,0,3c250fb1c7e5d6000f78feb41558372afafd22e5ddb80e3d8636d0ef38167c71,2023-11-14T18:55:01.147000 -CVE-2023-33046,0,0,07fb9439bd2b08a66819a1afc6aa6791da0e5802eda324abad6be6f64d7d99c9,2024-02-09T01:11:34.037000 -CVE-2023-33047,0,0,858669939473a1e46affe1927e1597c059024561ed220ddd893ff472d20a8e9f,2023-11-14T18:54:29.070000 -CVE-2023-33048,0,0,b6e51048394654b307dff96ab4ff26db5da1913686a04850578914207c5cfb6b,2023-11-14T18:53:55.253000 -CVE-2023-33049,0,0,ff54491ca72edaa829a00d9d4ad7da49ab333c80b19ece709ce56f1c5b60c833,2024-02-09T01:10:50.280000 +CVE-2023-33040,0,1,65898c1a486f3a3e3bc4de8f1e2ec2033e4d5d1db537f79456a5be7402261fe2,2024-04-12T16:15:16.893000 +CVE-2023-33041,0,1,25f72ad58a31dba46ba8dfbee685be29c0469572b2b4c774e3c0bac9f400f9e5,2024-04-12T16:15:17.163000 +CVE-2023-33042,0,1,252d948b367ed2c6a95d3b9b925531b47a64cab328299621a0745c029b5d470c,2024-04-12T16:15:17.407000 +CVE-2023-33043,0,1,8ec65ac19042ea6b0e53cba5c3a1aef3cde319a29f45d06121487abc84a4989b,2024-04-12T16:15:17.590000 +CVE-2023-33044,0,1,5d1d74d7f7fdfc6e76db61767f8e3b2f099204a949d4f497ef3097e449894751,2024-04-12T16:15:17.770000 +CVE-2023-33045,0,1,ca859964c963a817543c3967bb926515a74d3b96cabe1d57a8ce8c6e22c168ee,2024-04-12T17:17:18.683000 +CVE-2023-33046,0,1,44ccb8553d012d0693637d3eb781c0d5ffc9bd46b8a28e107e7dc41fd31f9474,2024-04-12T16:15:17.983000 +CVE-2023-33047,0,1,04c164d76321170c66ce8208b3680874eea8d2c7c0293e04312cc1ca160fd9c0,2024-04-12T17:17:18.960000 +CVE-2023-33048,0,1,3529b363a2e8d9adba121acbcfbc7b2cf2c47097d579e33101b80481ebce4317,2024-04-12T17:17:19.263000 +CVE-2023-33049,0,1,ca10f59c52b9ffa2a7bd2de2edbe2473fa91f67bc82fdaa3a16edfeacd4c3729,2024-04-12T16:15:18.180000 CVE-2023-3305,0,0,91916ea756a02b43d19e7004d66479d83e0fdc3f9e3b0068a35b688f18e1bc31,2024-04-11T01:21:08.073000 -CVE-2023-33053,0,0,96eaa2c7aa02cb7f4c784b281c5c7a0e3da35eebca46811eec793b186406c353,2023-12-11T18:06:27.913000 -CVE-2023-33054,0,0,edf70159983c31ce710c8473a4717c2d44b73c1813a8ad8e1e82c4831fc92cec,2023-12-11T18:13:32.720000 -CVE-2023-33055,0,0,c0cca62fa79e138d119b9641dc1a47650c8060e061f7cf05969cfe284fd773c5,2023-11-14T19:38:01.227000 -CVE-2023-33056,0,0,37f7789d5e2ba274da36e6414ef384d7888fb08044774c4f56582f0be0dcf180,2023-11-14T19:37:15.550000 -CVE-2023-33057,0,0,96e1f19b5239cb283b9580e722d294ffa59dcf6fd7d47dab95d3b61c9ba948da,2024-02-09T01:10:39.467000 -CVE-2023-33058,0,0,56187a31c0d98793ee5fdc44be8840361909920ed66a33e85ee5ab6807a6907a,2024-02-09T01:10:31.330000 -CVE-2023-33059,0,0,2332e0ee7b352cd89bee24ab3fa992ce15ac42121f7709c4ccbf0d7fc93c638f,2023-11-14T19:37:00.287000 +CVE-2023-33053,0,1,dfaebf2e77ae611410b2ac486f6387d816b9bb6b764bcbdb469389351990968d,2024-04-12T16:15:18.403000 +CVE-2023-33054,0,1,6906b3bbdcf2dad212abb4c0fa4fd45a3455018e1e54c93b9df54b69240a79cd,2024-04-12T16:15:18.700000 +CVE-2023-33055,0,1,1a7a5cdd3c15113c8e9eacf69769e5e95baf5a59e50a50f472bec85b607c8d4c,2024-04-12T17:17:19.530000 +CVE-2023-33056,0,1,96dcb84f61d5c20bdcc962024dad352def0a809f01c4c39c7bf1afab2c0c475b,2024-04-12T17:17:19.813000 +CVE-2023-33057,0,1,646fb03d7894248cf9c0d363fae9eed1f20a35d9c683c0a8ce0219090ae49ba6,2024-04-12T16:15:19.010000 +CVE-2023-33058,0,1,746bc6970b17a4eee7052a7d357dce1066993d8f6278fb8e3e1a50292114dd48,2024-04-12T16:15:19.237000 +CVE-2023-33059,0,1,d409fdedd3524398984ea2e8d289397a57572f687658d2e583ab99b72755e1e9,2024-04-12T17:17:20.073000 CVE-2023-3306,0,0,0b57f0573235174806683a2c00961b19cf4a24cb196b9cd9830090d306cffad8,2024-04-11T01:21:08.160000 -CVE-2023-33060,0,0,6919b2408ca6e2ca5b5073ddcbd2b3da2debadccf63462d6ef384f5e5d53c604,2024-02-09T01:09:39.027000 -CVE-2023-33061,0,0,1d54d0adf95a771827f8b5f9bf368c1db8861ea59041f22c8ebdf78a0018af0f,2023-11-14T19:36:36.217000 -CVE-2023-33062,0,0,907e830ed56ac57fa736e9f6417b828308f3da0a92a515c0f371be1d074077e0,2024-01-09T19:15:06.537000 -CVE-2023-33063,0,0,b1940fe640e194fa93ce97eefe328f3211f6782bb8fdcc2bce03010b5b1d537e,2023-12-11T18:20:10.893000 -CVE-2023-33064,0,0,6dd776b2920eb9dd281603dc6f5755fb4c29d66ee281e47759f5301df4cf4ff9,2024-02-09T01:08:59.433000 -CVE-2023-33065,0,0,3d00af61cd4de27614be3699ffacb5fef85399b516bbeac40da2eecc4e3d25fe,2024-02-08T22:10:10.700000 -CVE-2023-33066,0,1,5f123084f0a835a6d88ed1c6b4a3c9cc9cf63df9a5a392076e6357bc8b2f22f3,2024-04-12T15:15:20.407000 -CVE-2023-33067,0,0,f539f8de742103519c157eeb0d04510d09a3afb233b0b29f40dfcc6469625db2,2024-02-08T22:18:01.073000 -CVE-2023-33068,0,0,a58ac4021e585fb63bcfd5c48e31b161da427c0e2e2c9a14f8a08fafcc0d8833,2024-02-08T22:18:32.903000 -CVE-2023-33069,0,0,0fc7b71a6c8a80899aede95a4af45a05c2fcdcaac9e513288d142aabe1ac9e52,2024-02-08T22:19:01.727000 +CVE-2023-33060,0,1,670e34abcd3b78796a4d3dd9cc34d64a6e9b1ab784e5f1dc4c8e3285d75531d2,2024-04-12T16:15:19.423000 +CVE-2023-33061,0,1,dbef9f174d7f2048fee1e7a35d71906750cc141e1e5395f3ee43d5cc5ef9494d,2024-04-12T17:17:20.460000 +CVE-2023-33062,0,1,da73cc69c2c66609f801746263bc4161bb609227d6182680562369ac8c23af21,2024-04-12T16:15:19.590000 +CVE-2023-33063,0,1,d2ff914aca30571ccccb9061a216ac2c44899f22d948acb9970179479a56ef2e,2024-04-12T16:15:20.047000 +CVE-2023-33064,0,1,d3e54a3feec005960a6191ecaf58fbb0c144aa45e3fe6cad6e669d7c1e3aaf04,2024-04-12T16:15:20.483000 +CVE-2023-33065,0,1,4734b4eb81724a74b7ac3d642ddf936d854c20b17c34ab7a2d1ec846ccdd0057,2024-04-12T16:15:20.683000 +CVE-2023-33066,0,0,5f123084f0a835a6d88ed1c6b4a3c9cc9cf63df9a5a392076e6357bc8b2f22f3,2024-04-12T15:15:20.407000 +CVE-2023-33067,0,1,aade2c4db37478d9bf6da26e5d7a05d07a20ccdc639a25d2f2eb9c97308b2d49,2024-04-12T16:15:20.930000 +CVE-2023-33068,0,1,035de7ad9fcf25e729900b69798ac459d7c41d72d7aa00fc27092a244a55145c,2024-04-12T16:15:21.233000 +CVE-2023-33069,0,1,7a204c6327097862d6fb61e4106d71cb4622f0a4233ccbbba3fc26de1985db3b,2024-04-12T16:15:21.490000 CVE-2023-3307,0,0,412e4a0fad4196ed997df436c2cbe8b8838d3fb9b12a34c796328dc3fc619ec9,2024-04-11T01:21:08.250000 -CVE-2023-33070,0,0,79301ecf8f51f439ce5a44d30583c2e5a87b8c01c46dbc777937eeeca034eac4,2023-12-11T18:43:52.907000 -CVE-2023-33071,0,0,78893d4a036c78fff68e9e546eb70ce82e1072ab3a628eb0b2f61b40a15e0c48,2023-12-11T18:45:23.717000 -CVE-2023-33072,0,0,b7e2c1e98651dcdf8c89fe497290c62ea51b3a7b44ed2055ecc53f500b512c3b,2024-02-08T22:21:49.550000 -CVE-2023-33074,0,0,31c85b5702362c37c48006b0f5cb3fd66543ee4ba606835da331d3c6fe8e4dfe,2023-11-14T19:36:13.940000 -CVE-2023-33076,0,0,8f02df34e59a9d7f342d7e69b697d901d3ad2a93dc97321f870577ee87f08937,2024-02-08T22:23:06.457000 -CVE-2023-33077,0,0,f631d41c1bb98ba8fe45316166e3579a2933204de68908eb418de58d99f9dbc8,2024-02-08T22:23:50.630000 -CVE-2023-33078,0,1,61ec3b309643b9f444a58890b17daefe22948d9b81ba6695c529471cb80c754e,2024-04-12T15:15:20.517000 -CVE-2023-33079,0,0,b04d7539cba11ef5e05fb6838c46287a96863f1dad8437f25d03990988bed864,2023-12-11T18:54:15.047000 +CVE-2023-33070,0,1,6edb39029fdc9ff02f5e4a6ced88db4ed6fe96f46d0de157f338a2c744d92310,2024-04-12T16:15:21.727000 +CVE-2023-33071,0,1,8b978553faa6c2aab7b51e6f819ac67e12e1264a14ff9c8757ef65713434165e,2024-04-12T16:15:21.987000 +CVE-2023-33072,0,1,8ae851400c8e62f8d72d1a419195fb9c466d598d927f1f199bfa9af60793639d,2024-04-12T16:15:22.197000 +CVE-2023-33074,0,1,3336c221124afbcc0a5106eaf16a0c35e57cc0cc04cac3da521af2c8f0001ff8,2024-04-12T17:17:20.750000 +CVE-2023-33076,0,1,96add2a0eefe087ebdd1780f8a24ec43686e1f98b03ff0b71432fbbb9052b35e,2024-04-12T16:15:22.597000 +CVE-2023-33077,0,1,e3ae9fd478cce33b4dff36201338eb8ecfc2c887fa671ee56911f79a0a756659,2024-04-12T16:15:22.880000 +CVE-2023-33078,0,0,61ec3b309643b9f444a58890b17daefe22948d9b81ba6695c529471cb80c754e,2024-04-12T15:15:20.517000 +CVE-2023-33079,0,1,42d7b15341f89baee7591d6c236b7c5bf51ed2b75aac1d0717293f794e9d9c91,2024-04-12T16:15:23.100000 CVE-2023-3308,0,0,cebd7fb757469c6aa43323a1673c379f3cce510fa7d9562c79dede2652cd2a88,2024-04-11T01:21:08.333000 -CVE-2023-33080,0,0,7ce67b41350737bb51e0b4480da01cc8b4a85001ff4c97cd46d3c7417e471d85,2023-12-11T19:47:36.047000 -CVE-2023-33081,0,0,6363aa4fb46b3e7c3fa6a7d9f4a11e1fb4cc4fe8229c64e73b10fad19ecb3019,2023-12-11T19:46:53.910000 -CVE-2023-33082,0,0,06ccef986d338d005947990d53226893990804a44b71b8ea3371d37c849dce7d,2023-12-11T15:14:43.010000 -CVE-2023-33083,0,0,702e27e3b5d116047282736b669d39645f64bf8e7859212b56a16f208e3253e8,2023-12-11T15:14:17.950000 -CVE-2023-33084,0,1,96eb8e636807674f6db534e712afc23411ebc2b4bc177aa2fbeb7d3e9a06bfd9,2024-04-12T15:15:20.613000 -CVE-2023-33085,0,0,641775a2da3f7af95973dc45b980b4c7d5dc92e3769bbdbf7fb0b5042690b615,2024-01-08T18:45:18.993000 -CVE-2023-33086,0,1,34a42a03f873161c58b4ad73e944e2fa49378736979ea186808dc47192dca5ae,2024-04-12T15:15:20.723000 -CVE-2023-33087,0,0,737fd55eb6554f38a153fb8db212f2088a584b293162125066c28a0dfbf0ab7c,2023-12-11T15:13:33.843000 -CVE-2023-33088,0,0,585146eaefc8b2910695c5e3bb1e08ee1b600490e06bc56c5debec4fe3c5d171,2023-12-11T15:12:40.463000 -CVE-2023-33089,0,0,9ecce760da0027432ee1785dd4c37f5b6c1ede0af9afdf01034a392e104d68a6,2023-12-11T15:12:11.797000 +CVE-2023-33080,0,1,59afeaba984259e7beca0d708c7dedf82abae7dd5a2817588b50672d54b9fd8b,2024-04-12T16:15:23.350000 +CVE-2023-33081,0,1,97be8e5b5c7521ebcd421853bfbec41b8eb8fe48ccbb4e9ad393c465855f4973,2024-04-12T16:15:23.927000 +CVE-2023-33082,0,1,52096e3f9393be689fed0c1068a92e9958c0806d685e63af3bd91a69a0ec41e8,2024-04-12T16:15:24.203000 +CVE-2023-33083,0,1,aa207505ca87f3ec84fb6a3ca01b21fb8c374bc779e29fc1f1169657b6d8955a,2024-04-12T16:15:24.463000 +CVE-2023-33084,0,0,96eb8e636807674f6db534e712afc23411ebc2b4bc177aa2fbeb7d3e9a06bfd9,2024-04-12T15:15:20.613000 +CVE-2023-33085,0,1,fb3b7adeebc4f1af1c67bf52554c8e4456bae9045aab13fa734fc9b0b54716d8,2024-04-12T16:15:24.687000 +CVE-2023-33086,0,0,34a42a03f873161c58b4ad73e944e2fa49378736979ea186808dc47192dca5ae,2024-04-12T15:15:20.723000 +CVE-2023-33087,0,1,c3a9e533cfe18c3d45894ddedb00fdabad25fb4d3c498071c6bd3043ae7ea3fb,2024-04-12T16:15:24.917000 +CVE-2023-33088,0,1,ce5ed2f3fb892a26dfd93a570735f415406fd1ab93bf500c6adb3728207eb532,2024-04-12T16:15:25.170000 +CVE-2023-33089,0,1,9458f7090389f9b0ccd9141a2dd02fa0b03159b0fdd4165c4181c30c97d25ba2,2024-04-12T16:15:25.697000 CVE-2023-3309,0,0,f844450d1e35052f5d4514a3b26bdbff10c294f50425192f59ec9b72782e2d79,2024-04-11T01:21:08.420000 -CVE-2023-33090,0,1,a854119581f24c52fe865dfdc9ec2b2c32507798099f11be31ca092bda9fe40f,2024-04-12T15:15:20.820000 -CVE-2023-33092,0,0,1deae5639da2c24d4e9e8d49b5521ceeee18a7d28af6033468d16a9cd358d967,2023-12-11T15:10:32.717000 -CVE-2023-33094,0,0,0e6afd0e483a6a6f27a8784e67a66171df69ce6d779fa8c9fef37f4b443293b5,2024-01-09T19:16:41.780000 -CVE-2023-33095,0,1,fa4f07ada6b255347ae8c0af6deafa954aaef9662fd1c49b15af6a5b91bb2176,2024-04-12T15:15:20.930000 -CVE-2023-33096,0,1,caf4fa9c7ff4becda377c58f369a0b2eb5d88ba6a22a8e997b220e9232be7527,2024-04-12T15:15:21.037000 -CVE-2023-33097,0,0,037a1827184e21a02a9696384ac1072eb39d283834fc14cf9eebe9a7373ca15b,2023-12-11T15:09:50.730000 -CVE-2023-33098,0,0,4d1ca086431b7132ae85883effb66b33741b65e5b2bff6da8b6fd7972cda5b5b,2023-12-11T15:09:02.400000 +CVE-2023-33090,0,0,a854119581f24c52fe865dfdc9ec2b2c32507798099f11be31ca092bda9fe40f,2024-04-12T15:15:20.820000 +CVE-2023-33092,0,1,373b43973afa19365b95907d2b0e83d2e742bf675bf3d8b6e54fb7ef119df5cd,2024-04-12T16:15:26.160000 +CVE-2023-33094,0,1,e9897cec6d1461dd0a37efa641db379b2065e18d98f7381eec423edc13aa87c6,2024-04-12T16:15:26.420000 +CVE-2023-33095,0,0,fa4f07ada6b255347ae8c0af6deafa954aaef9662fd1c49b15af6a5b91bb2176,2024-04-12T15:15:20.930000 +CVE-2023-33096,0,0,caf4fa9c7ff4becda377c58f369a0b2eb5d88ba6a22a8e997b220e9232be7527,2024-04-12T15:15:21.037000 +CVE-2023-33097,0,1,664b80cb0e4a027694ce26c5ad2a97eda7defedbd7c964d4b443b48f72991829,2024-04-12T16:15:26.680000 +CVE-2023-33098,0,1,58cfcd4d5e02fd86e28386c0b44208484587bbdcca0e5d158f119eec3dd8dec0,2024-04-12T16:15:26.933000 CVE-2023-33099,0,0,284fb317fe394a992f0ebf58998018925ee3d3dea1ac3751f62f455ea3f3f51b,2024-04-12T09:15:09.120000 CVE-2023-3310,0,0,c9dd4d7e06895d36e1eb8dc7e64b2748e0d551866b9c52e8460b7cb60521390d,2024-04-11T01:21:08.507000 CVE-2023-33100,0,0,ad43aa3eb40c7a870dbb71415be51e5182dfb0081b7b951dca1fd0f823b2861e,2024-04-12T09:15:09.280000 CVE-2023-33101,0,0,c4cfabd9ba04737e1d7e20f3b7982acc6d7fdf40b3749e2066f979c06fad5837,2024-04-12T09:15:09.390000 -CVE-2023-33103,0,1,fa1b5ddde4a5152e7572f39c0b9b4a88fc8d329c68f7df95e04ebb514a91151b,2024-04-12T15:15:21.137000 -CVE-2023-33104,0,1,ab102c57944c7d70bdb1679043fe520ff149d2752526222207738184d1a96d8a,2024-04-12T15:15:21.230000 -CVE-2023-33105,0,1,348a1a9c8e015087afddc5a8e9625cd14d0f3ff13fc6ae10e121667d858ead3f,2024-04-12T15:15:21.327000 -CVE-2023-33106,0,0,1e75bc167a221351fb0b53b27e9fda73cfd9cfef35a2fb871ad8209ad60eb884,2023-12-11T15:06:16.443000 -CVE-2023-33107,0,0,1e460315f4b4dde6d23bb4b82c08fd43aa3436187da220cececdec6382cc4e24,2023-12-11T15:02:42.090000 -CVE-2023-33108,0,0,49e6f655dfe7117f0888e36b3a3113fe5c6707bf4548f79d09d7d1bd55b9718c,2024-01-08T18:46:16.817000 -CVE-2023-33109,0,0,601e518f562071edae61bac64a0facf71b1965cc7f170b7e8fc04965c11b4b34,2024-01-09T19:16:58.157000 +CVE-2023-33103,0,0,fa1b5ddde4a5152e7572f39c0b9b4a88fc8d329c68f7df95e04ebb514a91151b,2024-04-12T15:15:21.137000 +CVE-2023-33104,0,0,ab102c57944c7d70bdb1679043fe520ff149d2752526222207738184d1a96d8a,2024-04-12T15:15:21.230000 +CVE-2023-33105,0,0,348a1a9c8e015087afddc5a8e9625cd14d0f3ff13fc6ae10e121667d858ead3f,2024-04-12T15:15:21.327000 +CVE-2023-33106,0,1,a48a564d52750d2182099848bf109c793b2220a3c97bb18cabdc27476447d720,2024-04-12T16:15:27.653000 +CVE-2023-33107,0,1,0838af4fac785d6ed6e1b37fa7e6647057433a5d858e8ec1aac2395c94509e91,2024-04-12T16:15:28.040000 +CVE-2023-33108,0,1,5c9f915e7e8ddcbba8fbd30a7e255df81abc2987f45e0d6de8f28da18ba22bfb,2024-04-12T16:15:28.537000 +CVE-2023-33109,0,1,3fe1a0aa44f8f5240039cba0d9d43f7f72251607db0fa3e5acb51d652ea59d50,2024-04-12T16:15:28.787000 CVE-2023-3311,0,0,655bfb08b765359d981e9e9b1d731e624e7702073bd31717d1a58bf27f0486ae,2024-04-11T01:21:08.590000 -CVE-2023-33110,0,0,0a58aa9a9f11251eec56b1c7ad633f078d76f70bb16d54ac166e95d14c582035,2024-01-09T19:19:50.700000 +CVE-2023-33110,0,1,f2fe0de67990843bf79c63e5f299670cf0077751ca8a1bdee783b7f543c9882d,2024-04-12T16:15:29.317000 CVE-2023-33111,0,0,ed620880c11fd7aeaf89df44f8c0cb125d2173c325a2c8bc5b84bbae9d524070,2024-04-12T09:15:09.510000 -CVE-2023-33112,0,0,30b050044edf5df63c874632e138ac8864a1336629da6272536b355c1a9b7034,2024-01-09T19:21:32.643000 -CVE-2023-33113,0,0,408180beab72e6032ec99777f8ee13059d28d80ec73118c05e8d5d114a124982,2024-01-09T19:22:25.130000 -CVE-2023-33114,0,0,22f15233a1225c8a015662e47e32ee09ba395adf6477a940fe3d76709d8a9dc6,2024-01-08T18:48:14.563000 +CVE-2023-33112,0,1,8ed09f381c642e351b42d03656dc48e7a188d9339d7716abf531554191bab1b2,2024-04-12T16:15:29.610000 +CVE-2023-33113,0,1,67ac938a45f421f611d31116d118465d244d2a31456c97aa36dbf430c654917f,2024-04-12T16:15:29.843000 +CVE-2023-33114,0,1,d624a84af1a7112b6bc3b0e30bf4d5f75e24274f587a193b9697fede2320955e,2024-04-12T16:15:30.083000 CVE-2023-33115,0,0,fe42e485275521b00171edca6a4a76a16c497d01f7cafbf2b4b42ee1bd48c49a,2024-04-12T09:15:09.623000 -CVE-2023-33116,0,0,f5f98fe3cb876782b9b8b95b6c4a83fa33edae6209c035931def8d635efeaccb,2024-01-08T18:49:48.687000 -CVE-2023-33117,0,0,e3592fc4f72611362290f686fbcb190becf679ca7fe8716330ee6a2281273cf4,2024-01-08T18:50:40.583000 -CVE-2023-33118,0,0,152b3c8cf677d01c77c18f037c8d12c321229b767beb136a7b4389e60187be41,2024-01-08T18:56:00.013000 +CVE-2023-33116,0,1,64c59c6c9d7a3a36a58fd54925e380385b47d76f67582e5af970861b2d12cfe0,2024-04-12T16:15:30.297000 +CVE-2023-33117,0,1,cb5602c63453642057d89e562971d6ba6aa9878a45a02b42a13441d54acce404,2024-04-12T16:15:30.493000 +CVE-2023-33118,0,1,be50bbec26b07c9ada0d952d41339765ef2cf2cbe8eb191a211632fb705a42d0,2024-04-12T16:15:30.713000 CVE-2023-3312,0,0,ba746c59ffa4b76f476c49afb4d0f35a729070e71b41f70662ac233a39943fad,2023-11-07T04:18:28.417000 -CVE-2023-33120,0,0,7b57eb51c4de8a67ee055c2252ab8d92e9747145ade6e1687db6996b04ee0789,2024-01-09T19:22:36.173000 +CVE-2023-33120,0,1,dc2ac4e5cb65230d312bbf2bd19c6b3f34dcad461ea493ce9a7fc522a7981d68,2024-04-12T16:15:30.950000 CVE-2023-33121,0,0,ec5596adb48e4a501cd8e5a19ab505a5977adda76a536a4cd7f74ccc7fec4c13,2023-06-21T20:15:37.563000 CVE-2023-33122,0,0,9a0b2a58e225b33409cde918e731bb1a9a5e2934053341caf9495f2c4f77f0f2,2023-06-22T00:05:51.170000 CVE-2023-33123,0,0,791f1fcff6671c38c27f161648ad17bae5063db40d753124995526bac70e76a1,2023-06-21T20:37:57.867000 @@ -230764,37 +230764,37 @@ CVE-2023-43508,0,0,e6e6fcecd141e1903f307a1aa6ab6850b5be57b9ce1cd143b8007b95ba743 CVE-2023-43509,0,0,5a09c62d6061ebf2edcc5c887ba6ec6360cb48da32386e81af31dcd95ebf412a,2023-11-01T16:21:04.657000 CVE-2023-4351,0,0,c0cffcb9667e76f5ea5805d043eb698fe663b07b94bcd9e6d25c602928f50905,2024-01-31T17:15:14.517000 CVE-2023-43510,0,0,4cc8367292bce8cda349308a0f95902f31e73e1f2e86d1e0d04e2dd0e38e53fe,2023-11-01T16:20:02.553000 -CVE-2023-43511,0,0,4f221907e62651305632a5a32288e3ad67d8a23cde38b38dd0db116177e03dd7,2024-01-08T18:56:39.467000 -CVE-2023-43512,0,0,7ab55ea266d4535dec2aecd830497b2d5a277a4fe41ad95af6dc401b0140b432,2024-01-08T18:58:42.300000 -CVE-2023-43513,0,0,bc2beb3e4f3f02ed04972ae426f3a28a9641c6765237dc6135332d9dfe0c2cef,2024-02-09T00:49:48.173000 -CVE-2023-43514,0,0,a98af180d895550b32f0aad8d3ae05806e481c9ef4337116173d95ea3744ac38,2024-01-08T18:59:13.010000 +CVE-2023-43511,0,1,74bcd3b6f66e85d81367b83f6bb3951f0f1df905732592af516f626dde77cb1f,2024-04-12T16:15:31.280000 +CVE-2023-43512,0,1,83fd0824f859c5642243ca5d37938538c5fb7ab1bb7ad488ee532de5b7e64f6a,2024-04-12T16:15:31.800000 +CVE-2023-43513,0,1,a6170b33007a6a65e83ac9c8d57fdcdd0fdb2f2b72f784f48529e2cea23072b5,2024-04-12T16:15:31.983000 +CVE-2023-43514,0,1,a504377c6c830829c01c718ed2a5afe4b53400e8f615c56279f2f5937f2691bc,2024-04-12T16:15:32.370000 CVE-2023-43515,0,0,6d7fdf8dd426593404ffede4ca38bee07cae86fb091764ca118bde49c704e7b5,2024-04-12T09:15:09.743000 -CVE-2023-43516,0,0,7868529a5efd20a5da31df285b70cfd7e7a9c8b72515c1e48bcd75fa8fdf9aef,2024-02-09T00:50:24.280000 -CVE-2023-43517,0,0,b79fdc8ce6edee0c83f61f7e5cff4da87a3bb4881e062252338314b1374f7830,2024-02-09T00:51:20.140000 -CVE-2023-43518,0,0,3c52e69517627405d2c2b2acebe98884ccaefd681907bbd30da53ca640e1b7a2,2024-02-09T00:51:42.733000 -CVE-2023-43519,0,0,66a9aff9bb01febd257725b07555db287da4920d5eafecbe43f5e51ef7918830,2024-02-08T22:08:33.677000 +CVE-2023-43516,0,1,e1e1eaa9b6efa1746ef930f11a0e0a28d973073ada3d73a3a66ed56d0be6b4b2,2024-04-12T16:15:32.607000 +CVE-2023-43517,0,1,0a68a84b31aa510102c624e8a5ac785c06e5a314aa45490b4c5185624d7dede7,2024-04-12T16:15:32.747000 +CVE-2023-43518,0,1,90200daa73b520fb42ddf204bb540081e7b904979857d7f3fa7f2a0d2f07ac57,2024-04-12T16:15:32.877000 +CVE-2023-43519,0,1,d0b78cf2e14faf321b7184b16866fc3effa70d9fe26d335324570c04c3a05b7c,2024-04-12T16:15:33.150000 CVE-2023-4352,0,0,6c1dbd75a49cb5ccf83d2063ba155921c4cb78ac087196e3639221b68884d78a,2024-01-31T17:15:14.573000 -CVE-2023-43520,0,0,0c90048f235af61d0d6a378a06d20d469c0b4e72f1705a193b02c6ec28d4452d,2024-02-08T22:00:42.790000 -CVE-2023-43522,0,0,1887a30d14c9ef5d15e8891c81eefd222324ec8434582ee49a5417b753a3df62,2024-02-08T21:59:52.547000 -CVE-2023-43523,0,0,638cf8c5174907430f3ece2ea06cf399bd13fb09c48ff625cb2ed7afa1438ba8,2024-02-09T00:52:17.807000 +CVE-2023-43520,0,1,2af3adfbfd8dd5ed4e98b455388895977a7b44f811197112d7a7f380b9c5f94c,2024-04-12T16:15:33.420000 +CVE-2023-43522,0,1,d404805383c03a60f3b2ee4decdcd06951b8b382946749918819f0304b7ca486,2024-04-12T16:15:33.637000 +CVE-2023-43523,0,1,daf4e05866ff4e79b225ecb1e610dd5a8a96608b2257ccd8d28ed3625db54b64,2024-04-12T16:15:34.243000 CVE-2023-4353,0,0,a16025aa04f5242b62b2c37d5dc1156df484fcee2ce69f9caefe59378cd2a109,2024-01-31T17:15:14.650000 -CVE-2023-43532,0,0,07c3a30519eb87caedbebb82ca097d13cc3c8f1dc637b417fd43a7f8da3d5758,2024-02-08T21:19:44.773000 -CVE-2023-43533,0,0,8fa0aa9bcaea99fd7586293de5144970ef467c53c85c55596b4f446dba0e7d43,2024-02-08T21:17:59.437000 -CVE-2023-43534,0,0,08592e1e101894cc863d5834d1d8cb449259f84ba5cbdc8b1cc8d44a8caec45e,2024-02-08T21:17:05.153000 -CVE-2023-43535,0,0,0c2ed69f7b64c3801dd79b414b1b51a2e6f87601f70976408a8eda218fcc4812,2024-02-08T21:11:41.007000 -CVE-2023-43536,0,0,6bd82b95ef071eeb66c7eeddf1ce0e9f14892347ab9c70019e4d25dde04ae4ef,2024-02-08T21:09:43.057000 -CVE-2023-43539,0,1,a0d10ac25ff0d0f37bc7234eb89facc9efab87ef1fcabd6c86ec9bbddc79c96c,2024-04-12T15:15:21.433000 +CVE-2023-43532,0,1,8013c895677e5a622f745ba1269b1d79ec3b2ab2d964373aabcca0354e2bbd63,2024-04-12T16:15:34.570000 +CVE-2023-43533,0,1,c83c12170cfc12a2177864d7b691d22c75f08c594e8a75621122435a798bd8fd,2024-04-12T16:15:34.750000 +CVE-2023-43534,0,1,dba7439cea4cfc2b29f72af250575fb4036c5493c63694f3d269d919ecc92250,2024-04-12T16:15:35.230000 +CVE-2023-43535,0,1,e1269d8d312a2ceaa4b0553616412d9d494e38e4a6f1965a466dad52b8ea60f6,2024-04-12T16:15:35.560000 +CVE-2023-43536,0,1,76e2708fa3e9111d6523fd70d0293d879b927b408b44f21ef24c6fb42c1f6097,2024-04-12T16:15:35.820000 +CVE-2023-43539,0,0,a0d10ac25ff0d0f37bc7234eb89facc9efab87ef1fcabd6c86ec9bbddc79c96c,2024-04-12T15:15:21.433000 CVE-2023-4354,0,0,b3a04d1006e2f4eb94ee005944358fcae0c2bb0f216ffa6497c71e2291933a60,2024-01-31T17:15:14.710000 -CVE-2023-43540,0,1,efd650e6595c39c8362f88b761fdae11642adf9b9bde5b2fe188649abb18f8e1,2024-04-12T15:15:21.530000 -CVE-2023-43541,0,1,dfd1eb041ceb949b871d4f726bdc740a09a5ddb58d3ab0fafb1e00d5a19881d9,2024-04-12T15:15:21.620000 -CVE-2023-43546,0,1,89e5afff2dc3b88b31894eab3ce43642da3b283fc6cb7d2e88a199d429ebcad3,2024-04-12T15:15:21.713000 -CVE-2023-43547,0,1,450a59a4b4e1770738d3c56ace390dc05069b1396f6d86001db3ed0a662fe9c5,2024-04-12T15:15:21.810000 -CVE-2023-43548,0,1,08de2551449157c1420de1efb291b07e659743dfd8e0661fd70a491331034253,2024-04-12T15:15:21.907000 -CVE-2023-43549,0,1,f1de5fa849a4658fa863c5a64278b564558b0de4b9f2143d5edf8ce7fec403b4,2024-04-12T15:15:22.003000 +CVE-2023-43540,0,0,efd650e6595c39c8362f88b761fdae11642adf9b9bde5b2fe188649abb18f8e1,2024-04-12T15:15:21.530000 +CVE-2023-43541,0,0,dfd1eb041ceb949b871d4f726bdc740a09a5ddb58d3ab0fafb1e00d5a19881d9,2024-04-12T15:15:21.620000 +CVE-2023-43546,0,0,89e5afff2dc3b88b31894eab3ce43642da3b283fc6cb7d2e88a199d429ebcad3,2024-04-12T15:15:21.713000 +CVE-2023-43547,0,0,450a59a4b4e1770738d3c56ace390dc05069b1396f6d86001db3ed0a662fe9c5,2024-04-12T15:15:21.810000 +CVE-2023-43548,0,0,08de2551449157c1420de1efb291b07e659743dfd8e0661fd70a491331034253,2024-04-12T15:15:21.907000 +CVE-2023-43549,0,0,f1de5fa849a4658fa863c5a64278b564558b0de4b9f2143d5edf8ce7fec403b4,2024-04-12T15:15:22.003000 CVE-2023-4355,0,0,c361aa021bb0626a0e307b5cf33dd51fde9986638cf0f3a141e01925b83f1585,2024-01-31T17:15:14.840000 -CVE-2023-43550,0,1,1355e44b0bdef7fc02eec66c7d8c4c8822fa31e3406d0ce44b05faf4ddcb0384,2024-04-12T15:15:22.110000 -CVE-2023-43552,0,1,219a820f0d74d0eccbb21dd32fa4737b1fbff83065edd3c67c682afa52aaf7a9,2024-04-12T15:15:22.210000 -CVE-2023-43553,0,1,3824e0ea8ed5ad8dde20da11270e38123e4d2d966d89aa1a0e668fc6b193a630,2024-04-12T15:15:22.310000 +CVE-2023-43550,0,0,1355e44b0bdef7fc02eec66c7d8c4c8822fa31e3406d0ce44b05faf4ddcb0384,2024-04-12T15:15:22.110000 +CVE-2023-43552,0,0,219a820f0d74d0eccbb21dd32fa4737b1fbff83065edd3c67c682afa52aaf7a9,2024-04-12T15:15:22.210000 +CVE-2023-43553,0,0,3824e0ea8ed5ad8dde20da11270e38123e4d2d966d89aa1a0e668fc6b193a630,2024-04-12T15:15:22.310000 CVE-2023-4356,0,0,51f331be3605818c8ee40c6a87e55b57af1424a9aa9525f64ed6c38dd6cd0ef5,2024-01-31T17:15:14.917000 CVE-2023-43566,0,0,efdf21754c3a0ae7401b084dc8cb36a979c1eb2760f721e694f6e12bacd4880b,2023-09-21T20:01:48.277000 CVE-2023-43567,0,0,62549c4473db07fe33e73bf8ad53d67a47cce97917cc5d0271cf82dcf64929d4,2023-11-16T14:27:01.117000 @@ -235659,7 +235659,7 @@ CVE-2023-51404,0,0,03d659e63c7409b258b7617a5989915831e2a15185b68340b70dcd93bb9b4 CVE-2023-51406,0,0,a238f32f1eb3e652a13b28ea310d0a47f3f57733c2a5fc5d725f9533e03cf3aa,2024-01-12T15:58:15.567000 CVE-2023-51407,0,0,ad004b601dbf6f685afb458cdf4d82403bcc8d6d6e680fe93fa3f63ac024c69a,2024-03-17T22:38:29.433000 CVE-2023-51408,0,0,c20d8037706dbc2e6d07e0e9dd42b369544486833c9e2381c894f4dae43f5460,2024-02-06T12:15:54.883000 -CVE-2023-51409,1,1,85328f747be1550811f91adade9b38775666f39c88eb927d62db9e17b8f48b24,2024-04-12T14:15:07.370000 +CVE-2023-51409,0,0,85328f747be1550811f91adade9b38775666f39c88eb927d62db9e17b8f48b24,2024-04-12T14:15:07.370000 CVE-2023-5141,0,0,88c72e97ea5f40446f14b9a1c976a2aee10fdeb2f69ef43eb3a8d23b67777ba9,2023-12-07T20:19:16.397000 CVE-2023-51410,0,0,89637a1b19ac3ad767d2d614af08d71d95ccd3c379523f7aef3b7e80a9b6156d,2024-01-05T04:56:13.670000 CVE-2023-51411,0,0,c454e0d959073a096be50948b21f45a6c9cc1b78ba4a3fb410dc71105327f4d0,2024-01-05T04:56:04.837000 @@ -235736,7 +235736,7 @@ CVE-2023-51490,0,0,2680f2d6f6375b9824fc6757a48e23b37f978e2d9eb836f9e43a2664af2bf CVE-2023-51491,0,0,9a630e61b90ae68231ccba63898cc12e25e82adc34d74019316f737ba08d8e2f,2024-03-17T22:38:29.433000 CVE-2023-51492,0,0,0d58b27a14611c109e89a3494fa756a640689ff79517444f7259a888456dbe6f,2024-02-15T06:26:42.423000 CVE-2023-51493,0,0,f83cd3e9ef3ea1708a4f0f0755e074e9ad1d27d8d5ae20aecf4ecfd903ab0733,2024-02-15T06:26:48.450000 -CVE-2023-51499,1,1,f2d044df15212f33cf85c2634260336dd0f61e5a7df6bd891245f10d7b1a7c1f,2024-04-12T15:15:22.410000 +CVE-2023-51499,0,0,f2d044df15212f33cf85c2634260336dd0f61e5a7df6bd891245f10d7b1a7c1f,2024-04-12T15:15:22.410000 CVE-2023-5150,0,0,184da5ee9408e244d9f8f43b27f516c19972de628f0b483d063afe2d79643051,2024-04-11T01:22:53.850000 CVE-2023-51501,0,0,f7c0af90b49f4800553d6eaf99fce90d0b249b6e7f11848115cc7b8a9ef8cb7a,2024-01-04T19:46:39.560000 CVE-2023-51502,0,0,af58b8e2bede5795adccbd422590e74433c504afc74f900e0869b5e94fc9d8fa,2024-01-11T14:16:03.027000 @@ -235750,7 +235750,7 @@ CVE-2023-5151,0,0,5edab470fc24d89f4b532477551a5d174161bf79164f1bf971092a67fd303f CVE-2023-51510,0,0,1353ad84455c49924d2f2d254540a7ae311db5ead3a69fa8532e229874af65a0,2024-03-17T22:38:29.433000 CVE-2023-51512,0,0,b503b131cbc4230950d7fc98e64892f0904a9f3b2b59ccf4a240d2b4fe53e2d1,2024-03-17T22:38:29.433000 CVE-2023-51514,0,0,44a388f30c139a4590a3bf56e00fe693595a163e9cef7869b048530195c7b7e1,2024-02-06T01:02:10.990000 -CVE-2023-51515,1,1,07f64a76601b9473c9239ae45fa6f851acc88caa17d90951cb3371fffbc9a856,2024-04-12T15:15:22.607000 +CVE-2023-51515,0,0,07f64a76601b9473c9239ae45fa6f851acc88caa17d90951cb3371fffbc9a856,2024-04-12T15:15:22.607000 CVE-2023-51517,0,0,1a69e7a8868bb57fe23881af905a555a81020cb04edb85fe9a748430c692e5c8,2024-01-05T18:14:06.130000 CVE-2023-51518,0,0,82d2f1d17566273e3d96a161b87d4f3f7567388d39e7cb79eb1a426bdc54e536,2024-02-27T14:20:06.637000 CVE-2023-5152,0,0,a6bc782db4d7f756a8bbc6e4b40589623cb47ab142ff5a6def661cbaaa207c4f,2024-04-11T01:22:54.027000 @@ -236145,7 +236145,7 @@ CVE-2023-52206,0,0,95dfdd7aea8d33a40e02dba6a07cab53d852dacad1381b8095a5563e8dd7b CVE-2023-52207,0,0,8811a262457d47a928522c6d4c018a091faaddd37faf85fb909e774e66447e24,2024-01-11T18:59:59.720000 CVE-2023-52208,0,0,9ed351f5d9cad0471fed88b06cec98b8cea6e1cb366c882b7648760856f996f0,2024-01-11T19:01:44.920000 CVE-2023-5221,0,0,5c2e377cea35de41ca31ef85106a60c749f20d9d5c98cb98c49912b2b0b99b16,2024-04-11T01:22:54.880000 -CVE-2023-52211,1,1,1d1a5022dd4cda0f0d98784645bc940851225ede2c48943951317c9bdbf44ac1,2024-04-12T15:15:22.793000 +CVE-2023-52211,0,0,1d1a5022dd4cda0f0d98784645bc940851225ede2c48943951317c9bdbf44ac1,2024-04-12T15:15:22.793000 CVE-2023-52213,0,0,c567e205c61b5b287735b8f3f6708ba72962cb7ab86a1661d42ad149b5793151,2024-01-11T19:58:54.940000 CVE-2023-52214,0,0,14ea0972e349f398d3a5349df2d5a9495710f3bd4730164cb7ae8af418410693,2024-03-26T17:09:53.043000 CVE-2023-52215,0,0,09e0a9efe106868b4fd9c2063e3947d919ee70f494a812fa7c8f77418249d5e9,2024-02-02T15:20:39.863000 @@ -238265,6 +238265,7 @@ CVE-2024-0083,0,0,ab832b2e89667613797d661d736b6cac31cc3f4854c5fe470b78e46bd7a9f8 CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000 CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000 CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000 +CVE-2024-0157,1,1,3c7d306ba5c349389c0dd005fe8cb072a4fdc9dc666817fce658edb3c587f9c5,2024-04-12T17:17:21.027000 CVE-2024-0159,0,0,1e894f3b7e8a4464a8a938598dea9c22b2785f51066fcb76006f4e3a3483cf07,2024-04-10T13:23:38.787000 CVE-2024-0161,0,0,73817f9b8418eb2b694637c6f29b853142572f0b28368cfdbc90d03735fa61fd,2024-03-13T18:16:18.563000 CVE-2024-0162,0,0,d4afb611e62def47b22c9b0a9015aad8ee85286e9696283d1d6c34751c0c24e7,2024-03-13T18:15:58.530000 @@ -240373,34 +240374,34 @@ CVE-2024-21584,0,0,d66fedfad76e69bf70f964d573fe608d89f94eedd1312d57b206120486115 CVE-2024-21585,0,0,6e8206f1fdf94b37b9dcf7444e5790dcbe04c3a87e39f8bb6c4b0625dfa3058a,2024-01-31T00:15:45.920000 CVE-2024-21587,0,0,00caf8e0dd355879f913af1e174cfaccf48910da74261d4402cf2eff2334cffc,2024-01-19T17:44:35.830000 CVE-2024-21589,0,0,68b0ee433e5dc2a6e0c5986e659a2299beb8087cc670f80d46b90c5ac3b4a35f,2024-01-19T17:41:50.160000 -CVE-2024-21590,1,1,187813100763169ddc2e9990a1ed41b309f56d0188b7306e589de57c65694b9b,2024-04-12T15:15:22.983000 +CVE-2024-21590,0,0,187813100763169ddc2e9990a1ed41b309f56d0188b7306e589de57c65694b9b,2024-04-12T15:15:22.983000 CVE-2024-21591,0,0,77ced40d9ea71de7e0f4aa61db192f300bee1246d7e33e78b4e3a0dcf328f916,2024-02-10T00:15:07.937000 -CVE-2024-21593,1,1,73e506282a9d81de9c895ae725a5df0aa40b8c6589de111b6de33b35ffeeceaf,2024-04-12T15:15:23.187000 +CVE-2024-21593,0,0,73e506282a9d81de9c895ae725a5df0aa40b8c6589de111b6de33b35ffeeceaf,2024-04-12T15:15:23.187000 CVE-2024-21594,0,0,e78a123747e83bf49352997c96ddda43bd5d099d3d39e44bb746f6f4a84212bf,2024-01-18T20:14:10.903000 CVE-2024-21595,0,0,7e3b4ba0763cdce89df3527c01080d2771397fbe88ccc082e192e7e54ade6128,2024-01-18T20:37:57.160000 CVE-2024-21596,0,0,fdd5f969eb5a163c3b72b647f0662316060804632e52fd460429f04bfbe771b4,2024-01-26T01:15:10.873000 CVE-2024-21597,0,0,0c0be1133340914db6b7c339beb6f79249e7d6c481b234afba13bf552af31fb6,2024-01-19T21:04:30.330000 -CVE-2024-21598,1,1,0b0f78e85a82dcea4388208b12c48241af0a8ddf89d2f11fa4d0409df49c0685,2024-04-12T15:15:23.377000 +CVE-2024-21598,0,0,0b0f78e85a82dcea4388208b12c48241af0a8ddf89d2f11fa4d0409df49c0685,2024-04-12T15:15:23.377000 CVE-2024-21599,0,0,b6986e58982b522e42c45d11c584d16703553b99d9cc7ed66d50aec3d341a92f,2024-01-19T21:00:23.387000 CVE-2024-21600,0,0,b035659aec3f1f176588ca55009dd933cd41bad7a1bbf5fc58abacea7c8eac27,2024-01-19T22:57:21.587000 CVE-2024-21601,0,0,7af8a486a0225380a453e7f77af784106bd554df30e6e12f1ee8c22d8e6f7668,2024-01-19T22:57:04.600000 CVE-2024-21602,0,0,5cd1e85919b92872b0a7198e9346cefb3363865de2579415f157021a395f3a0f,2024-01-19T22:55:48.297000 CVE-2024-21603,0,0,5e7483c06b1362370b238b3358b2d2d1060dd7892d782c487259a0cc90e72824,2024-01-19T22:56:11.320000 CVE-2024-21604,0,0,e787a9df0dc8f25058d388d25163a4cc5f3913e14a1093774ea289d84439290d,2024-01-19T22:56:35.733000 -CVE-2024-21605,1,1,b7dbdee01e0547c5758d6c5a5bebed364c47bf47e23912cd112687825c12eb95,2024-04-12T15:15:23.577000 +CVE-2024-21605,0,0,b7dbdee01e0547c5758d6c5a5bebed364c47bf47e23912cd112687825c12eb95,2024-04-12T15:15:23.577000 CVE-2024-21606,0,0,49eed53b92ea5967ecc8506d68d364dd03476481b4e6af255fa643399535b306,2024-01-18T20:39:18.483000 CVE-2024-21607,0,0,824127359662e17f1719b4d75f9c5251e0f05686a14d2ec8275304e55ca84af3,2024-01-18T20:41:11.583000 -CVE-2024-21609,1,1,64688b22f8a7f197485860e4d632592b0addad4e3f25e5654eed896b3679d81a,2024-04-12T15:15:23.770000 +CVE-2024-21609,0,0,64688b22f8a7f197485860e4d632592b0addad4e3f25e5654eed896b3679d81a,2024-04-12T15:15:23.770000 CVE-2024-2161,0,0,a7da9777950101d7d645df756765a63d69ef22787ab068141bbe991e117a7f4a,2024-03-21T12:58:51.093000 -CVE-2024-21610,1,1,bee71af430da5e2b71bccea4af5b725f2072152b7b096a9e26205e074388286e,2024-04-12T15:15:23.950000 +CVE-2024-21610,0,0,bee71af430da5e2b71bccea4af5b725f2072152b7b096a9e26205e074388286e,2024-04-12T15:15:23.950000 CVE-2024-21611,0,0,2bccc34c974fe6c59a7c6ecd3d1a5979300a11543e68a8075903f6487feb315f,2024-01-18T20:30:07.573000 CVE-2024-21612,0,0,5732ddf6c63348a96ed82a459355f1faf56ec988fd7988fdbcca91631a76e55c,2024-01-29T16:15:09.040000 CVE-2024-21613,0,0,9e1f5114cc61dba156702a2c9c4c3b72da8fea7588af50e8819440b18f482ceb,2024-01-19T20:20:24.847000 CVE-2024-21614,0,0,8d539bf5ae817b0470f0c70aaedd179cab247b33e50ec3941ea5a2440a07723e,2024-01-18T18:56:50.410000 -CVE-2024-21615,1,1,b9377d18cad8124c1e40ef1106510d5748606da1b2e9315a5761e1ef95f3bf65,2024-04-12T15:15:24.153000 +CVE-2024-21615,0,0,b9377d18cad8124c1e40ef1106510d5748606da1b2e9315a5761e1ef95f3bf65,2024-04-12T15:15:24.153000 CVE-2024-21616,0,0,f39d46751752e22e2321a7ef05fd862c5a10960f2cacfda4fe8d7bf215e8a0a6,2024-01-19T20:37:44.537000 CVE-2024-21617,0,0,3c99a5ef2be9b6b549820cb627633e4da0462e39ee83d3e23a4c2bd4560ef4cb,2024-01-26T00:15:07.990000 -CVE-2024-21618,1,1,dd9028dc192ccd989e5c17a9ed2da660ef85d9b635f91a7bb1e7dadf4f08891a,2024-04-12T15:15:24.350000 +CVE-2024-21618,0,0,dd9028dc192ccd989e5c17a9ed2da660ef85d9b635f91a7bb1e7dadf4f08891a,2024-04-12T15:15:24.350000 CVE-2024-21619,0,0,d630e4fb239b7e878418ca252d6407931ae2fc1529a547d8b8afa2d754cee142,2024-01-31T23:46:19.863000 CVE-2024-2162,0,0,e76b952db5fcbf512bc4b4dc583154d5f7b948325f07202835b21ff5f9c9c01c,2024-03-21T12:58:51.093000 CVE-2024-21620,0,0,878d76ad63311b7179c3547fef604d320537e07ef9a726525ed6e5923f00fa22,2024-02-01T20:20:19.847000 @@ -240796,15 +240797,19 @@ CVE-2024-22320,0,0,b7e6bc5c871bb2a076b1c4d217e351ebb443d568b1fdbb86f9513f16f0da1 CVE-2024-22328,0,0,1d3eba54d3dcb9850fbd9a86e1475d83621830be3d74777232b85acf89e88234,2024-04-08T18:48:40.217000 CVE-2024-22331,0,0,79325856c8baa9082651d9383783f7a4198ba299d30e2c67010ba88c7f1776a4,2024-02-13T20:26:23.780000 CVE-2024-22332,0,0,a27f7ab666232b70f986037d449131d6bde483413718019674022f07be0d9b9e,2024-04-03T02:15:07.973000 +CVE-2024-22334,1,1,7a3eff62ca800948a5c4282eadb47042734cf340a079dfb72c62fb4787d14046,2024-04-12T17:17:21.300000 CVE-2024-22335,0,0,94b1135a0842e43602bc9fceeeec6f6d8338d5d9b6e931e6a3e1f0f5ed52affb,2024-02-20T19:50:53.960000 CVE-2024-22336,0,0,92b17f3ddf77b7c8a53a41f903603d0d36207de06fae8bd71fc2469777bc3663,2024-02-20T19:50:53.960000 CVE-2024-22337,0,0,9a674fac9bc4716d61a028d3be9473027552f3c1c11335efca4b4ddefd1e14f0,2024-02-20T19:50:53.960000 +CVE-2024-22339,1,1,4eadbbb34a5cae0da35989ebb6386f0ae527aafcef1af5c684b177d55e441f8f,2024-04-12T17:17:21.647000 CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000 CVE-2024-22352,0,0,8ad74f9c108b142191e10d9f1af5800c7055fc5b8e79f7a9a2cf40171c06b8cd,2024-04-01T15:23:54.530000 CVE-2024-22353,0,0,dcde4e1942667b685d2979f87ac00f95d42a8fc5d16f7dbd8bc9f66a2b78dfbb,2024-04-02T17:56:57.187000 CVE-2024-22355,0,0,d5e1a0b55aa53f554235616979c7aa7e85f01ce7f183bc4e8573dd18cbbe1419,2024-03-04T13:58:23.447000 CVE-2024-22356,0,0,d81d64e63fe9b642cced3e4c94acc5e30f0113b5fdf3bed9ebc6028d04aab3ff,2024-03-26T17:09:53.043000 CVE-2024-22357,0,0,7cc996f78175ddc6bc31990b99ad084fcec784716961a600ab611825166f830e,2024-04-12T12:43:57.400000 +CVE-2024-22358,1,1,70267586fa933dd0ec7fa272ee40f014528d1632b23fda68a3e3132c27132cdd,2024-04-12T17:17:22.023000 +CVE-2024-22359,1,1,79414cbc7afeb296669e8e86e5f481863147de2fd6404092f89049afceb19203,2024-04-12T17:17:22.373000 CVE-2024-2236,0,0,1caa0e5cdfb424662cbf6124414533e4ab1dd9ca210ea89ecd59ad25abc68f72,2024-03-07T13:52:27.110000 CVE-2024-22360,0,0,b51802432bc04c6d8daeffb43226824cdd8f27647664bb8d35541e7d6a53f5a2,2024-04-03T17:24:18.150000 CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000 @@ -241593,7 +241598,7 @@ CVE-2024-23944,0,0,f43338dd87cfcc17eed1c688a50d71eb2e6c07149980e5cb55596978d1a03 CVE-2024-23946,0,0,32194d05d3f7a3a80cd0b416a872a66ff74b3120ea9e0897100b1fe32331e71d,2024-03-12T17:29:17.243000 CVE-2024-2395,0,0,1fdafc69366cd072c6108b6d86410a63c85cce9eeaa62bcac076c3a2bc3a1766,2024-03-13T12:33:51.697000 CVE-2024-23952,0,0,55ac92ed6d5397c8c4017daee50a06c19289bc020dda334e41d90b5a55f45fd1,2024-02-14T14:16:07.460000 -CVE-2024-2397,1,1,2f93bfdda053e010a1dd80b8c20f169c7262caa34b058fe376c8361a0dbe755d,2024-04-12T14:15:07.657000 +CVE-2024-2397,0,0,2f93bfdda053e010a1dd80b8c20f169c7262caa34b058fe376c8361a0dbe755d,2024-04-12T14:15:07.657000 CVE-2024-23975,0,0,baeca8d4c06e1a18eea86da121d0a833b4b39a471498d57fc82722b025e37962,2024-03-22T12:45:36.130000 CVE-2024-23976,0,0,9685f4f7ec189a5d86ae9e492003126f133b025f9dbebea5b2080780048e5888,2024-02-14T18:04:45.380000 CVE-2024-23978,0,0,e1857c353eed9f61fa476b5e0089cb191d24c6fab4326dd88df47ad6e74b90ff,2024-04-11T01:24:50.970000 @@ -243927,6 +243932,7 @@ CVE-2024-28868,0,0,148f39496eb50fd19cf01404a0af3408bd44ce8d437a837fa99cdad3557f9 CVE-2024-2887,0,0,2797f3580910b2ccb8b3f25b6a77410f5acecf7fa931702ac72d99637f4042cf,2024-03-29T04:15:09.423000 CVE-2024-28870,0,0,0cf8b42440c9130608dacb5605e29ce5ef5a35c267c5a5fa0e99bf26d2d0161c,2024-04-04T12:48:41.700000 CVE-2024-28871,0,0,afc28d49a83d8eabefecf413603caf0043f414fa513c9500837e2c75462e6216,2024-04-04T16:33:06.610000 +CVE-2024-28878,1,1,d400e80a0e48f97fa07e8fd00ebae81ac58cba7612b96e29cb1cf044bcdc3b08,2024-04-12T16:15:36.647000 CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000 CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000 CVE-2024-28891,0,0,d3e45bd47b45b967827b685dc5aca79c502a599b4c4b2ae06f1259844016862c,2024-03-22T12:45:36.130000 @@ -244209,7 +244215,7 @@ CVE-2024-29454,0,0,c5e740cd1abf29bb706f61bdcb9cac715190bdeda241ee5e4735d3e49da21 CVE-2024-29455,0,0,6e1789780e5aa8031c75de8caec34ad04dbe0084b961cab46e445dc7c45cfc0e,2024-04-11T12:47:44.137000 CVE-2024-2946,0,0,8a22c9853e8b531bbd8a8e90a11cfdbe9528f15dbd8531539c68a8acd7935dc8,2024-04-10T13:23:38.787000 CVE-2024-29460,0,0,a86cab0a2fd502381de5f641ee662fdee151a3a747010fc347b01d225e8de57b,2024-04-11T12:47:44.137000 -CVE-2024-29461,1,1,0a962275603a40d5edfc4c251c5b3ff3f503370fb441ed65dfd9001dd22fa797,2024-04-12T14:15:07.597000 +CVE-2024-29461,0,0,0a962275603a40d5edfc4c251c5b3ff3f503370fb441ed65dfd9001dd22fa797,2024-04-12T14:15:07.597000 CVE-2024-29469,0,0,fcd29429266b7a87e58735d5b1a87e454245abd68c4217f0834c945fcf2dbdeb,2024-03-21T12:58:51.093000 CVE-2024-2947,0,0,1f5db3dcaa8eaba268358fabd07cd32a790eaac8bc91ef0018408fc63d80627e,2024-03-31T02:15:09.150000 CVE-2024-29470,0,0,47e23a8af4be8b838695296b19cd4bea426144fbae12eb976431244ea0a84b06,2024-03-21T12:58:51.093000 @@ -244491,6 +244497,7 @@ CVE-2024-30202,0,0,31db9c331e53ee7e35e14a4f4da9c9118966173e7dfd1773c267c14439e4d CVE-2024-30203,0,0,444aebb38c12835907cb7a31abaa6167c0351378679f511812ede323236ede80,2024-03-25T16:43:06.137000 CVE-2024-30204,0,0,036541cdb0b2547c6a0b159ebcde955e789df823270814d2ecf5a2ea473b3058,2024-03-25T16:43:06.137000 CVE-2024-30205,0,0,49c6abb5e041dbd344a1c2878ff4314f11b475ed55487542fa5ade5e7cd812b8,2024-03-25T16:43:06.137000 +CVE-2024-30210,1,1,30d566158537087ec526e2fc265b558a22b801dcecc5e50a2ccc0752b5fde1b7,2024-04-12T16:15:36.987000 CVE-2024-30214,0,0,7c4820c684a267b228fa4a4665b794d39804e491dff54bd3f2105fbbb658d34b,2024-04-09T12:48:04.090000 CVE-2024-30215,0,0,ab2bb7d1fb5a1429f982c34c6c343c5bdb990b01f1c65a84e0f966e88ca26da6,2024-04-09T12:48:04.090000 CVE-2024-30216,0,0,b2a60633096c48481bfba33a475cbb1ec9bd028014eb767b662e1172ca558cda,2024-04-09T12:48:04.090000 @@ -244593,17 +244600,31 @@ CVE-2024-30366,0,0,20837e89d03fae3723d55fae431100502ce2f90ed93f7c89739d7faef9644 CVE-2024-30367,0,0,a902af43f2971ddd47d7eebd60d52a9673dc37a2dcdcf1f5ecafc349085ea3e6,2024-04-03T12:38:04.840000 CVE-2024-30370,0,0,0b843daff5c28582cf7b13f2850b1d8c607c4ae5b045b88facad224f99e19e5b,2024-04-03T12:38:04.840000 CVE-2024-30371,0,0,b1d655f20dce1a124d87b962baf334d2a249a3ceff7f094651f12c5849e1f6ee,2024-04-03T12:38:04.840000 -CVE-2024-30381,1,1,f1c2c317b5710e15e4557388a9c37f792644ee168ca4bf0916c6c04a20582b49,2024-04-12T15:15:24.547000 +CVE-2024-30381,0,0,f1c2c317b5710e15e4557388a9c37f792644ee168ca4bf0916c6c04a20582b49,2024-04-12T15:15:24.547000 +CVE-2024-30382,1,1,24b817b9d61ee4e3fc353acffa903e1289be5d8c14b927b14d293f3b76cfc92d,2024-04-12T16:15:37.207000 +CVE-2024-30384,1,1,c9a91c116216478dfd95155e951cd62d940331fadaeaab379dc90a34917e9e68,2024-04-12T16:15:37.440000 +CVE-2024-30386,1,1,3ad20b2201a3b7003864172b2c2cc2834456b7a16dab8c724f1afec4f8af8171,2024-04-12T16:15:37.650000 +CVE-2024-30387,1,1,f0f74d4c28477212037e6668f54eca250599fd2727962768f2c516e05b47a20d,2024-04-12T16:15:37.867000 +CVE-2024-30388,1,1,02a37e0c8ef87f4c3bf69c5e579e827f0c8e668146a7ccaf92bae13e88acfcb8,2024-04-12T16:15:38.093000 +CVE-2024-30389,1,1,3796dac64e0f3aa57382452f5f59d8ee00b80da57dc55fced48a92a935a95b11,2024-04-12T16:15:38.317000 CVE-2024-3039,0,0,55545b6d89dead973aa38c24f8690b00ced17483d150b274a387764766d67497,2024-04-11T01:25:52.547000 -CVE-2024-30394,1,1,707696d1c364472959b422ebd363a6c2543527b400e4d4d3dda09f237e018b7a,2024-04-12T15:15:24.730000 -CVE-2024-30395,1,1,4a437278d49b8de8295e124db31b7d2c657c185a8038d5537040cadcb2d3f919,2024-04-12T15:15:24.930000 +CVE-2024-30390,1,1,7d9ed04ca3fba8ae412e22140a5c946eb413eb1e4a90caeabcd0816d6c356a73,2024-04-12T16:15:38.540000 +CVE-2024-30391,1,1,8ccfe19d5942541b9cc89d5126d8e2865f190276f50a52929eaa58a0fb8795b3,2024-04-12T16:15:38.773000 +CVE-2024-30392,1,1,08d799511ac3e53972c9c8b9dd9c8fae323a6695249040841267bbb88a6be7e1,2024-04-12T16:15:39.040000 +CVE-2024-30394,0,0,707696d1c364472959b422ebd363a6c2543527b400e4d4d3dda09f237e018b7a,2024-04-12T15:15:24.730000 +CVE-2024-30395,0,0,4a437278d49b8de8295e124db31b7d2c657c185a8038d5537040cadcb2d3f919,2024-04-12T15:15:24.930000 +CVE-2024-30397,1,1,f7c1763519554a7ad007c4c9ae1c52a51ef05f264e6eeba5d0261617e97757e3,2024-04-12T16:15:39.267000 +CVE-2024-30398,1,1,f1115ff79397f5794927f10beeff2fbba79a23646494ef42840476514c6fc70c,2024-04-12T16:15:39.497000 CVE-2024-3040,0,0,4e26b66115bdf420fa4dc721093d7208816fa4c3b9ab47dd9a64cdbe6f653d65,2024-04-11T01:25:52.630000 -CVE-2024-30405,1,1,2b1c15f8c3a8ddb52a23b4c3f601929fa9b18d0e8b5b97fb0030a7dabfb9ac61,2024-04-12T15:15:25.133000 -CVE-2024-30406,1,1,dd9c799f1a19c270a6caaece7bf68131c70a42d03539587ec8f9bce1980b4db2,2024-04-12T15:15:25.340000 -CVE-2024-30407,1,1,843d909b532b1e61629c2d4d9ada492992122fca640b2681f4c11e568b1804bb,2024-04-12T15:15:25.540000 -CVE-2024-30409,1,1,c0a1581d68460ed70b7af2853eedc651e1b49bf910b14b13f73a08dedd57f9de,2024-04-12T15:15:25.740000 +CVE-2024-30401,1,1,7867bc52a8f433ac94db428d5ab608bf852a451fbccd3d4e370ed3d137251473,2024-04-12T16:15:39.713000 +CVE-2024-30402,1,1,8156d981745eee5cdfe4e6e49452042788693e29b92497881eff14f169290e33,2024-04-12T16:15:39.930000 +CVE-2024-30403,1,1,077176e110ad59e861d5fe36b3bfd9d5f3191b645f688d975b5bd4b6b6169d02,2024-04-12T16:15:40.123000 +CVE-2024-30405,0,0,2b1c15f8c3a8ddb52a23b4c3f601929fa9b18d0e8b5b97fb0030a7dabfb9ac61,2024-04-12T15:15:25.133000 +CVE-2024-30406,0,0,dd9c799f1a19c270a6caaece7bf68131c70a42d03539587ec8f9bce1980b4db2,2024-04-12T15:15:25.340000 +CVE-2024-30407,0,0,843d909b532b1e61629c2d4d9ada492992122fca640b2681f4c11e568b1804bb,2024-04-12T15:15:25.540000 +CVE-2024-30409,0,0,c0a1581d68460ed70b7af2853eedc651e1b49bf910b14b13f73a08dedd57f9de,2024-04-12T15:15:25.740000 CVE-2024-3041,0,0,1b6abd568295f89cd7b24b042777247c05ea398bb0d361c953df51d4fa28a33f,2024-04-11T01:25:52.717000 -CVE-2024-30410,1,1,448007c0d0584969d6d246bcb9d630cd69211b97c93adb3dd3b3d68ace44f399,2024-04-12T15:15:25.940000 +CVE-2024-30410,0,0,448007c0d0584969d6d246bcb9d630cd69211b97c93adb3dd3b3d68ace44f399,2024-04-12T15:15:25.940000 CVE-2024-30413,0,0,4cf06db61df807fcc74aa648c1b9ac4ca10277aeb4409e9671e26c3e9929fc90,2024-04-08T18:48:40.217000 CVE-2024-30414,0,0,2c0a8d8a82d469bff92aa352b8d798b45aa2cad2b17c84504ee68ec76d46e644,2024-04-08T18:48:40.217000 CVE-2024-30415,0,0,c67029325d33a1ce8e97b7604f93756b30725418df8597cb37f9b0d4375403a5,2024-04-08T18:48:40.217000 @@ -244835,7 +244856,7 @@ CVE-2024-30808,0,0,3edb296009dfb16a5061a2505986b3903e36250320b7a7a1ea6af0d775f58 CVE-2024-30809,0,0,40751d191f9ee13ea0defe4c96fc4834cb0c82544cd8de5e25d1d000018428a9,2024-04-02T20:31:58.463000 CVE-2024-3081,0,0,eaf9a3b1546f12509096efb03067d93183d42d698f454ab86e3fca514e07d309,2024-04-11T01:25:53.020000 CVE-2024-3084,0,0,62ac9245d10a841fd1840ac1e3c7dc9559936072e020c624e95405bbb39b1228,2024-04-11T01:25:53.100000 -CVE-2024-30845,1,1,9113965041be6194fffa5a72ece91f3d0dbc5b1a9fdbb57d65232d222341116b,2024-04-12T14:15:07.870000 +CVE-2024-30845,0,0,9113965041be6194fffa5a72ece91f3d0dbc5b1a9fdbb57d65232d222341116b,2024-04-12T14:15:07.870000 CVE-2024-30849,0,0,7b5f44f857a491a504ba5c8594af0e6700798260b9e3192b0dae6774fedb652e,2024-04-05T12:40:52.763000 CVE-2024-3085,0,0,5085f6259bd4d1908968638b16f14533956036f8bbee9b567c9970e9e940c577,2024-04-11T01:25:53.173000 CVE-2024-30850,0,0,e145f5a1f669362cb833973c2b9f1972b1377c7badd79d19ebe34b1d7ac4aea3,2024-04-12T12:43:46.210000 @@ -244899,6 +244920,7 @@ CVE-2024-31062,0,0,9a85b45f2ef9be7ff3563a8d396c3a8dd45f237219d28fbf343c7fa8953f9 CVE-2024-31063,0,0,8c5e031664c3b218697e91183f663111a47f52e7fd5496cafc4f238d7a0c4ce8,2024-03-28T20:53:20.813000 CVE-2024-31064,0,0,f87fea954d6623f92ad98dc571744769b0a41ba2a8ecac509cf34a5bc1aaafc6,2024-03-28T20:53:20.813000 CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c7946d3,2024-03-28T20:53:20.813000 +CVE-2024-31069,1,1,6ea04a7f37eb9469d59b021bfe2c82e8533df0befeaced0dbdd1041ed2ab455d,2024-04-12T16:15:40.303000 CVE-2024-31080,0,0,1cc286b77fccc4a1e2e98e6f3f968e5940cd990f96d0d4a7993d35a50b9d510b,2024-04-11T23:15:10.563000 CVE-2024-31081,0,0,0e194570d10bf21e5fde5e565ee3c93bf10ea4fb047fd95a31224c77922821a1,2024-04-11T23:15:10.667000 CVE-2024-31082,0,0,5bd47d789b65017aa198a3c2ac34b0aa429ab490a4fcd5200779dbcd7d5b3ef9,2024-04-04T16:33:06.610000 @@ -245059,7 +245081,7 @@ CVE-2024-31386,0,0,15fec49971ff13003aab552d95c7df7a6744ee4763b24dacb4b183ffe115e CVE-2024-31387,0,0,17f74c0a0abd1b62b72a9c701ac4bcd4b8a101eb98e9ec3658a2a206201f0cf8,2024-04-11T13:30:38 CVE-2024-3139,0,0,c174ece4bd5366d5eddcb8afdcde0c6c7c4276d7790f9ff1f5e9ef5c069a0098,2024-04-11T01:25:54.583000 CVE-2024-31390,0,0,0875d8345a5b76d413fbbf2495b8c73d39cfd6ca77e21422f3300e66fa9097ad,2024-04-05T14:15:10.590000 -CVE-2024-31391,1,1,b2475d8e5abd21f576cf2da27f3d94cb4d5a9bf3266cb07e681af798ed90da88,2024-04-12T15:15:26.157000 +CVE-2024-31391,0,0,b2475d8e5abd21f576cf2da27f3d94cb4d5a9bf3266cb07e681af798ed90da88,2024-04-12T15:15:26.157000 CVE-2024-31392,0,0,e47fa59932bfeb069e43bdeea717668f4f8eb0beb6cf866b3eeac98c4b5a7755,2024-04-03T17:24:18.150000 CVE-2024-31393,0,0,37f7a5992221d6bde3095665f91d96a5b3c012db649e1c1c87f1a16619b63290,2024-04-03T17:24:18.150000 CVE-2024-3140,0,0,f955e9a197bec2af1ee3ba4b9254baf265b2087729bb81419461877a1d6f34de,2024-04-11T01:25:54.673000 @@ -245118,7 +245140,7 @@ CVE-2024-31816,0,0,8b0edd8a38c33b33b513f099b5e67906c887d32cd0308b5fdfadcac29bc21 CVE-2024-31817,0,0,440a95dbf8589f9a9953a43f37d15f507abb02f786409b55238dedab4fef773a,2024-04-08T18:48:40.217000 CVE-2024-31818,0,0,25ea78f8bfa9f141d6385203058e8f46dd97de2a067220f6e8af85d5bfe3594d,2024-04-12T13:15:20.590000 CVE-2024-31819,0,0,38e498d0570206c0203f3af977a8de6ceaed3f9b34269dce35a3781d3462a082,2024-04-11T12:47:44.137000 -CVE-2024-31839,1,1,45aff84f813253a9dfeed68f22c85eabdd41244e6746a454f2b16b2b0c949750,2024-04-12T14:15:07.947000 +CVE-2024-31839,0,0,45aff84f813253a9dfeed68f22c85eabdd41244e6746a454f2b16b2b0c949750,2024-04-12T14:15:07.947000 CVE-2024-31848,0,0,2da60f6a287cac48661bc0aa0bb0ac92caa20fc3ae4255bef230dfecf644c92e,2024-04-08T18:49:25.863000 CVE-2024-31849,0,0,f45798bfe1f17890c1c9f615c3d632efe82fbe29dd84fe4753d6d6beae3b4f6a,2024-04-08T18:49:25.863000 CVE-2024-31850,0,0,4dfa9605a049a09744618be099ad889f274ff40fc42a18e168685588a6a44b6d,2024-04-08T18:49:25.863000 @@ -245269,7 +245291,7 @@ CVE-2024-3385,0,0,dafd55987e5738b5d6ec37d523526a7e0269d60d96cd780933abafbc800645 CVE-2024-3386,0,0,d08d523d066834a85bfe06023f05a033d8631a6197479f66bfb86438af143c6d,2024-04-10T19:49:51.183000 CVE-2024-3387,0,0,59a783d7f5a632f1312dc02ccd745e7c758f93e478c4554a0dbc9aba27d256c0,2024-04-10T19:49:51.183000 CVE-2024-3388,0,0,9a13547aa29d2171bfe252870fb3dde44261a463a11a31d9062dc130e0f3c4f3,2024-04-10T19:49:51.183000 -CVE-2024-3400,0,0,c9b4203f67fa4a53c6f2d97bd61e2bf5f1fd6a9d92edd6f9d3ca0ee556551d3f,2024-04-12T12:43:46.210000 +CVE-2024-3400,0,1,a7fb4369c1edafd9dd0c253d4a56f0613f5ef17867cd70c990f03207dacbf942,2024-04-12T17:17:22.740000 CVE-2024-3413,0,0,7c0263f5aa26015f580f259b17ac76e3fb232807ce6eb6b3e0fa4a42d34def58,2024-04-11T01:26:00.727000 CVE-2024-3414,0,0,fcf8b2012e3dcab7048965e9d40e8c26f25a86217cc70e6c24a2ae712b119943,2024-04-11T01:26:00.803000 CVE-2024-3415,0,0,80d83d8ba89e3620cb20eb7a8b2b10e1c5fbd8b76c068e7c00b4af6deadd81dd,2024-04-11T01:26:00.900000 @@ -245354,12 +245376,17 @@ CVE-2024-3620,0,0,a7eeb1bc049879e174341aab349252fb94be8452f8b1f4ee171cd19f6ef0b1 CVE-2024-3621,0,0,84afe5bfc8ac11b311e81571bedd8fcb4ae60929cf687215eae135d692582687,2024-04-11T12:47:44.137000 CVE-2024-3652,0,0,a467de8b64f8147acdef48edc35752a89afb7d5856e17302ea9c57335ed0f61c,2024-04-11T12:47:44.137000 CVE-2024-3685,0,0,5dbf2f4fea69e09c737fc66bbcb0aca348f1b9b76e80a25bce70b4ae49f51189,2024-04-12T13:15:20.653000 -CVE-2024-3686,1,1,17ac801e41417a54d8da3c3eae094294f3578a0955392bf4edb9b7729c614b66,2024-04-12T14:15:08.003000 -CVE-2024-3687,1,1,eb99608dc87c56e6186fd94e39f8bc837aa01ec2cd25192b288dc56ab3bfbb09,2024-04-12T14:15:08.250000 -CVE-2024-3688,1,1,76ea57ba972c8e869f0733486e673011357dbb1d3ae4dc10e3f8ec10e11952db,2024-04-12T14:15:08.513000 -CVE-2024-3689,1,1,101d2da623d4dc3459f8f59a49e1b13391c2851697bbdaec1102062a56619cb8,2024-04-12T15:15:26.257000 -CVE-2024-3690,1,1,5be9fcacbeedfbaa3b9456875c7b90dd674b33c2eb23f3a7638c89d9f5e09877,2024-04-12T15:15:26.473000 -CVE-2024-3704,1,1,e8b6557f07c3fe3c16a11f9907fbc87710993b702f6563c7d85b780932cbd316,2024-04-12T14:15:08.743000 -CVE-2024-3705,1,1,2bc387e0e063040ff9997a85917ee5054e5d8ff6aa4452dfa552c1e99ffec9f1,2024-04-12T14:15:08.957000 -CVE-2024-3706,1,1,b84e37b2c552516ee4a0f32cf3830dbd2c73a09095547957d50af0151fcc5c1c,2024-04-12T14:15:09.160000 -CVE-2024-3707,1,1,eb352789e04f524e5cbaa3cc32eede86c9d34c43271df46831f4e1e1d4795e81,2024-04-12T14:15:09.383000 +CVE-2024-3686,0,0,17ac801e41417a54d8da3c3eae094294f3578a0955392bf4edb9b7729c614b66,2024-04-12T14:15:08.003000 +CVE-2024-3687,0,0,eb99608dc87c56e6186fd94e39f8bc837aa01ec2cd25192b288dc56ab3bfbb09,2024-04-12T14:15:08.250000 +CVE-2024-3688,0,0,76ea57ba972c8e869f0733486e673011357dbb1d3ae4dc10e3f8ec10e11952db,2024-04-12T14:15:08.513000 +CVE-2024-3689,0,0,101d2da623d4dc3459f8f59a49e1b13391c2851697bbdaec1102062a56619cb8,2024-04-12T15:15:26.257000 +CVE-2024-3690,0,0,5be9fcacbeedfbaa3b9456875c7b90dd674b33c2eb23f3a7638c89d9f5e09877,2024-04-12T15:15:26.473000 +CVE-2024-3691,1,1,e6ed71cb06e97e7a0732cf1fb18771205c06875a5936edc1d0904914e44c8cf6,2024-04-12T16:15:40.480000 +CVE-2024-3695,1,1,cbe5a3deaf46cfa299b95df5e2ac72c8aa06dc02af8f48536fd91fe21f336527,2024-04-12T16:15:40.707000 +CVE-2024-3696,1,1,2126d2c532cd56b120dada5f18cffeba7b0d165e5485e05a1850bd562b095d61,2024-04-12T16:15:40.943000 +CVE-2024-3697,1,1,2434eb2e432e1150c25b835146244dec8233cd1735f69152fc7b1753c1eb7b4c,2024-04-12T17:17:22.983000 +CVE-2024-3698,1,1,3577ccdca560c8d4d521ff47258ba7a12858089266fe20d855672651a247b4f7,2024-04-12T17:17:23.337000 +CVE-2024-3704,0,0,e8b6557f07c3fe3c16a11f9907fbc87710993b702f6563c7d85b780932cbd316,2024-04-12T14:15:08.743000 +CVE-2024-3705,0,0,2bc387e0e063040ff9997a85917ee5054e5d8ff6aa4452dfa552c1e99ffec9f1,2024-04-12T14:15:08.957000 +CVE-2024-3706,0,0,b84e37b2c552516ee4a0f32cf3830dbd2c73a09095547957d50af0151fcc5c1c,2024-04-12T14:15:09.160000 +CVE-2024-3707,0,0,eb352789e04f524e5cbaa3cc32eede86c9d34c43271df46831f4e1e1d4795e81,2024-04-12T14:15:09.383000