diff --git a/CVE-2009/CVE-2009-41xx/CVE-2009-4123.json b/CVE-2009/CVE-2009-41xx/CVE-2009-4123.json
new file mode 100644
index 00000000000..10553a7d7b0
--- /dev/null
+++ b/CVE-2009/CVE-2009-41xx/CVE-2009-4123.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2009-4123",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T16:15:07.407",
+ "lastModified": "2023-12-12T17:22:30.567",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The jruby-openssl gem before 0.6 for JRuby mishandles SSL certificate validation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://jruby.org/2009/12/07/vulnerability-in-jruby-openssl",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/advisories/GHSA-xgv7-pqqh-h2w9",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jruby-openssl/CVE-2009-4123.yml",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://web.archive.org/web/20101213091125/http://jruby.org/2009/12/07/vulnerability-in-jruby-openssl",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2013/CVE-2013-25xx/CVE-2013-2513.json b/CVE-2013/CVE-2013-25xx/CVE-2013-2513.json
new file mode 100644
index 00000000000..ad4169d370b
--- /dev/null
+++ b/CVE-2013/CVE-2013-25xx/CVE-2013-2513.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2013-2513",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T16:15:07.490",
+ "lastModified": "2023-12-12T17:22:30.567",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The flash_tool gem through 0.6.0 for Ruby allows command execution via shell metacharacters in the name of a downloaded file."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/advisories/GHSA-6325-6g32-7p35",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/flash_tool/CVE-2013-2513.yml",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2179.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2179.json
new file mode 100644
index 00000000000..aeba833d726
--- /dev/null
+++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2179.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2015-2179",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T17:15:07.383",
+ "lastModified": "2023-12-12T17:22:30.567",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The xaviershay-dm-rails gem 0.10.3.8 for Ruby allows local users to discover MySQL credentials by listing a process and its arguments."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://www.vapid.dhs.org/advisory.php?v=115",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2015/CVE-2015-83xx/CVE-2015-8314.json b/CVE-2015/CVE-2015-83xx/CVE-2015-8314.json
new file mode 100644
index 00000000000..123eebd364f
--- /dev/null
+++ b/CVE-2015/CVE-2015-83xx/CVE-2015-8314.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2015-8314",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T17:15:07.450",
+ "lastModified": "2023-12-12T17:22:30.567",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Devise gem before 3.5.4 for Ruby mishandles Remember Me cookies for sessions, which may allow an adversary to obtain unauthorized persistent application access."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/advisories/GHSA-746g-3gfp-hfhw",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/heartcombo/devise/commit/c92996646aba2d25b2c3e235fe0c4f1a84b70d24",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://rubysec.com/advisories/CVE-2015-8314/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2018/CVE-2018-161xx/CVE-2018-16153.json b/CVE-2018/CVE-2018-161xx/CVE-2018-16153.json
new file mode 100644
index 00000000000..cb1e755c09d
--- /dev/null
+++ b/CVE-2018/CVE-2018-161xx/CVE-2018-16153.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2018-16153",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T17:15:07.517",
+ "lastModified": "2023-12-12T17:22:30.567",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in Apereo Opencast 4.x through 10.x before 10.6. It sends system digest credentials during authentication attempts to arbitrary external services in some situations."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://docs.opencast.org/r/10.x/admin/#changelog",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/advisories/GHSA-hcxx-mp6g-6gr9",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.apereo.org/projects/opencast/news",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-106xx/CVE-2020-10676.json b/CVE-2020/CVE-2020-106xx/CVE-2020-10676.json
new file mode 100644
index 00000000000..9fd9e3ccb7f
--- /dev/null
+++ b/CVE-2020/CVE-2020-106xx/CVE-2020-10676.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2020-10676",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T17:15:07.580",
+ "lastModified": "2023-12-12T17:22:30.567",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In Rancher 2.x before 2.6.13 and 2.7.x before 2.7.4, an incorrectly applied authorization check allows users who have certain access to a namespace to move that namespace to a different project."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://forums.rancher.com/c/announcements",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/advisories/GHSA-8vhc-hwhc-cpj4",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/rancher/rancher/releases/tag/v2.6.13",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/rancher/rancher/releases/tag/v2.7.4",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-126xx/CVE-2020-12612.json b/CVE-2020/CVE-2020-126xx/CVE-2020-12612.json
index acb35b91b04..9a5932c9030 100644
--- a/CVE-2020/CVE-2020-126xx/CVE-2020-12612.json
+++ b/CVE-2020/CVE-2020-126xx/CVE-2020-12612.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-12612",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-12T14:15:07.327",
- "lastModified": "2023-12-12T14:15:07.327",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-12T15:52:06.410",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2020/CVE-2020-126xx/CVE-2020-12614.json b/CVE-2020/CVE-2020-126xx/CVE-2020-12614.json
new file mode 100644
index 00000000000..9ac76537027
--- /dev/null
+++ b/CVE-2020/CVE-2020-126xx/CVE-2020-12614.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2020-12614",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T15:15:07.363",
+ "lastModified": "2023-12-12T15:52:06.410",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. If the publisher criteria is selected, it defines the name of a publisher that must be present in the certificate (and also requires that the certificate is valid). If an Add Admin token is protected by this criteria, it can be leveraged by a malicious actor to achieve Elevation of Privileges from standard user to administrator."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.beyondtrust.com/support/changelog/privilege-management-for-windows-5-6-sr1",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.beyondtrust.com/trust-center/security-advisories/bt22-10",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-283xx/CVE-2020-28369.json b/CVE-2020/CVE-2020-283xx/CVE-2020-28369.json
new file mode 100644
index 00000000000..a8e1de34db9
--- /dev/null
+++ b/CVE-2020/CVE-2020-283xx/CVE-2020-28369.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2020-28369",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T15:15:07.450",
+ "lastModified": "2023-12-12T15:52:06.410",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In BeyondTrust Privilege Management for Windows (aka PMfW) through 5.7, a SYSTEM installation causes Cryptbase.dll to be loaded from the user-writable location %WINDIR%\\Temp."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.beyondtrust.com/privilege-management/windows-mac",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.beyondtrust.com/trust-center/security-advisories/bt22-08",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-244xx/CVE-2022-24403.json b/CVE-2022/CVE-2022-244xx/CVE-2022-24403.json
index bc4b52b7ade..bfc3d9e5597 100644
--- a/CVE-2022/CVE-2022-244xx/CVE-2022-24403.json
+++ b/CVE-2022/CVE-2022-244xx/CVE-2022-24403.json
@@ -2,16 +2,40 @@
"id": "CVE-2022-24403",
"sourceIdentifier": "cert@ncsc.nl",
"published": "2023-12-05T14:15:07.510",
- "lastModified": "2023-12-05T15:27:54.807",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:04:43.967",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The TETRA TA61 identity encryption function internally uses a 64-bit value derived exclusively from the SCK (Class 2 networks) or CCK (Class 3 networks). The structure of TA61 allows for efficient recovery of this 64-bit value, allowing an adversary to encrypt or decrypt arbitrary identities given only three known encrypted/unencrypted identity pairs."
+ },
+ {
+ "lang": "es",
+ "value": "La funci\u00f3n de cifrado de identidad TETRA TA61 utiliza internamente un valor de 64 bits derivado exclusivamente de SCK (redes Clase 2) o CCK (redes Clase 3). La estructura de TA61 permite una recuperaci\u00f3n eficiente de este valor de 64 bits, lo que permite a un adversario cifrar o descifrar identidades arbitrarias con solo tres pares de identidades cifradas/no cifradas conocidas."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
{
"source": "cert@ncsc.nl",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-327"
+ }
+ ]
+ },
{
"source": "cert@ncsc.nl",
"type": "Secondary",
@@ -46,10 +80,30 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:midnightblue:tetra\\:burst:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E47ED5D3-E6C3-419A-9A3B-9F20863B9FDA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://tetraburst.com/",
- "source": "cert@ncsc.nl"
+ "source": "cert@ncsc.nl",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44543.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44543.json
new file mode 100644
index 00000000000..0f74bce2c68
--- /dev/null
+++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44543.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2022-44543",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T17:15:07.663",
+ "lastModified": "2023-12-12T17:22:30.567",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The femanager extension before 5.5.2, 6.x before 6.3.3, and 7.x before 7.0.1 for TYPO3 allows creation of frontend users in restricted groups (if there is a usergroup field on the registration form). This occurs because the usergroup.inList protection mechanism is mishandled."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://typo3.org/help/security-advisories",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://typo3.org/security/advisory/typo3-ext-sa-2022-015",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45362.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45362.json
index 3568d15d701..062cb941b43 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45362.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45362.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45362",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-07T11:15:07.260",
- "lastModified": "2023-12-07T12:12:22.533",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:01:04.050",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -40,7 +60,7 @@
},
"weaknesses": [
{
- "source": "audit@patchstack.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -48,12 +68,43 @@
"value": "CWE-918"
}
]
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:paytm:payment_gateway:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.7.0",
+ "matchCriteriaId": "314EA12B-7C66-491F-93AE-0D5682605636"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/paytm-payments/wordpress-paytm-payment-gateway-plugin-2-7-0-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20275.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20275.json
new file mode 100644
index 00000000000..57f8d6dace4
--- /dev/null
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20275.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-20275",
+ "sourceIdentifier": "ykramarz@cisco.com",
+ "published": "2023-12-12T18:15:16.520",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to send packets with another VPN user's source IP address. This vulnerability is due to improper validation of the packet's inner source IP address after decryption. An attacker could exploit this vulnerability by sending crafted packets through the tunnel. A successful exploit could allow the attacker to send a packet impersonating another VPN user's IP address. It is not possible for the attacker to receive return packets."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "ykramarz@cisco.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-vpn-Y88QOm77",
+ "source": "ykramarz@cisco.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21740.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21740.json
new file mode 100644
index 00000000000..dc05fd4e555
--- /dev/null
+++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21740.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-21740",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:16.720",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Windows Media Remote Code Execution Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21740",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26920.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26920.json
new file mode 100644
index 00000000000..34e5dc800cd
--- /dev/null
+++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26920.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-26920",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T17:15:07.720",
+ "lastModified": "2023-12-12T17:22:30.567",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "fast-xml-parser before 4.1.2 allows __proto__ for Prototype Pollution."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gist.github.com/Sudistark/a5a45bd0804d522a1392cb5023aa7ef7",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/2b032a4f799c63d83991e4f992f1c68e4dd05804",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/advisories/GHSA-793h-6f7r-6qvm",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-280xx/CVE-2023-28017.json b/CVE-2023/CVE-2023-280xx/CVE-2023-28017.json
index ee95c34b1cc..2b0163fafdf 100644
--- a/CVE-2023/CVE-2023-280xx/CVE-2023-28017.json
+++ b/CVE-2023/CVE-2023-280xx/CVE-2023-28017.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-28017",
"sourceIdentifier": "psirt@hcl.com",
"published": "2023-12-07T05:15:07.970",
- "lastModified": "2023-12-07T12:12:36.717",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T15:51:51.903",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "psirt@hcl.com",
"type": "Secondary",
@@ -38,10 +58,58 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:connections:6.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "217197F0-089E-463E-904D-BDB31F929FE2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:connections:6.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9D30E64-F094-4692-A882-CAAA3AFE8C1B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:connections:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FD4BF4C3-3D45-41A8-886F-521E095CBBF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:connections:8.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D55E0F2F-7C8D-4334-8B8D-CCF88431F6DF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108264",
- "source": "psirt@hcl.com"
+ "source": "psirt@hcl.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28465.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28465.json
new file mode 100644
index 00000000000..0f7d9952789
--- /dev/null
+++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28465.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-28465",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T17:15:07.770",
+ "lastModified": "2023-12-12T17:22:30.567",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The package-decompression feature in HL7 (Health Level 7) FHIR Core Libraries before 5.6.106 allows attackers to copy arbitrary files to certain directories via directory traversal, if an allowed directory name is a substring of the directory name chosen by the attacker. NOTE: this issue exists because of an incomplete fix for CVE-2023-24057."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/advisories/GHSA-9654-pr4f-gh6m",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.smilecdr.com/our-blog",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.smilecdr.com/our-blog/statement-on-cve-2023-24057-smile-digital-health",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28580.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28580.json
index e499d4f7add..16b189aedfb 100644
--- a/CVE-2023/CVE-2023-285xx/CVE-2023-28580.json
+++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28580.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-28580",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-12-05T03:15:09.390",
- "lastModified": "2023-12-05T13:51:04.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:52:17.877",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
@@ -38,10 +58,1216 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5AEA324C-69CE-4AAC-91D6-6FAAE1B3FA77"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A7B5F5CD-CE26-4C93-9FED-F783947DBDA6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin",
- "source": "product-security@qualcomm.com"
+ "source": "product-security@qualcomm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28585.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28585.json
index 996aabe8e4e..bc26c5bd7ea 100644
--- a/CVE-2023/CVE-2023-285xx/CVE-2023-28585.json
+++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28585.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-28585",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-12-05T03:15:09.563",
- "lastModified": "2023-12-05T13:51:04.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:16:10.227",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.0,
+ "impactScore": 6.0
+ },
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
@@ -38,10 +58,7614 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-119"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:9205_lte_modem_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "920F873B-F52D-4754-9726-BECCAD0CAC45"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:9205_lte_modem:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5EB573E2-C2B9-4B12-9EEF-9152FBFE3927"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:c-v2x_9150:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B80D6366-4C0C-4C0D-9A38-769C66D62F0F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1AA32CC0-DE30-4B15-8EC6-1FAF14C5C4E2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "770F3924-BE27-4BDE-B922-680B3C9753EB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fsm10056_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0EF47C0-45AA-4B1C-B9E8-A83E5D9938F9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fsm10056:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A78E2A04-CD5D-4963-A45D-B111DD5E0B44"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1AA3313-749F-486B-8212-33E569377C2B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:immersive_home_3210_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B6F6D44F-BD86-44B9-BE5D-471D33F0438D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7BB0662A-2D27-4AE7-8370-0B567B9A8214"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:immersive_home_326_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67970B89-2F06-4E4A-88CA-9D37C060C1BA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq5332_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A795F64D-6DE9-4D56-AA22-D77470B9E5AD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq5332:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "32521715-D9BF-4A86-BE4B-D9BB29C133F0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA7A5C46-48BF-42A9-A477-A660C6D7B437"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EDB79382-19D6-4A67-9013-7099A9C58829"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq6005_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4695A9D-A02C-4E73-A327-E811C55B4EDF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq6005:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28E41848-525C-4126-89C2-54BD193768DB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A5CF970F-17AE-4C59-89A5-5B41A41E1DE0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "71C54A70-AAA8-4B5E-AC1B-471A5C7E79B0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B04589FF-F299-4EF6-A57B-1AD145372DBB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FDC1ADAD-DA77-47EF-8DB9-C36961C560C2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06126F30-D081-4A11-92FB-4074A451FAF9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2550040-CCC7-4B52-8D3E-7948B3E3C62B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "78A6F4F3-0CE3-4A02-B615-63E76C93ADC4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "31D07608-80F7-44AA-BE91-1F97FC1CE313"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq9554_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C656780-05E9-40D5-936B-B73ECE9E0330"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq9554:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD2DF80E-E546-473B-AE26-594CFB8A87A8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq9570_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A6182C0-AAE7-45A9-8ECB-F198B55181AB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq9570:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "61FC3830-8AAF-4836-89C3-2C6355CC0272"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0327D8C9-DD6B-4831-BBD4-2EE57A351493"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0C866E83-23ED-495C-AA5A-0B01973674BF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:mdm9205s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0AEA758D-ECAD-4973-9586-2621CC3B2BA2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:mdm9205s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D4F1EED8-567D-4E1B-92D6-37ADE97B06FC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca0000_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC941093-1A7C-47B2-AB3B-05AE4AE2FBE4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca0000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7A2AA834-C17C-4E0E-A510-795818041E47"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DFB39496-8699-4DAF-BD7B-AE69260B20CB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E9CFBC24-5F15-40DE-806E-62C1EE808992"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C359D1E7-6E0A-41B5-ABE5-B55598960700"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B4DC3CE7-0C4A-458B-A42E-8F80C062DD5F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B0F8ED6-EAE7-44EA-A8C6-F5AD408261F0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "966CDA56-809F-4FF4-909D-0DD92F44CF67"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C90747B4-2CC0-4816-A994-58E00F5ADA05"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "00FE294D-4BE0-4436-9273-507E760884EC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "424CB795-58E5-43A4-A2EC-C563D93C5E72"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93ED74CE-6BF2-4983-8780-07D5336745B3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11405993-5903-4716-B452-370281034B42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BFC575E-594E-4711-94B1-2DC8D03B9AC4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8072_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1F4012FC-F0D9-41DE-BC2A-FBDD1B212540"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8072:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B16C4C53-F8BA-48D2-A7EE-90A06499722D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC8A5A87-7D62-4EB7-962A-0F160DE3E889"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7B68D126-7F49-4FFA-8AF8-78120973D78E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB1F2E8B-1ED2-473D-AFD8-F2590F6BD414"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FBDA9657-7D30-41FD-8112-F53E6C69D53A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1B9045A8-BA53-43C4-B24D-5EF320DE7A4A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3D6E8939-AFA3-41AC-B811-BCC282A43106"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B87335A8-DC52-478E-B19F-0C4CC63132EA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99C34523-FE2A-4DDC-9A8A-D9072F3D0FD3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "08E9E6CB-2216-4AF2-81C2-D482598298BE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4774FAA6-6141-4B08-819C-58D4D9A2B69F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98E58C63-F253-4DCC-8A14-48FEB64B4C3D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93BA2DC9-5B4F-4F8F-8B3D-8DA01043B9BD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FA8880F-E513-4390-B839-C5D86E7A89EB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcf8000_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9A05AC12-9E7A-4837-A447-1718396011FC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcf8000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8E3FF297-D849-45AE-AAB8-DDEA64A23FF3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "287199B4-9CBB-4290-BDB3-ABBB41794259"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcf8001:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "142DC510-DD92-4174-8B37-4D239573661E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "214A053F-D80C-4AD9-B4F1-83384095A3F3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "74EBA77E-69A5-4145-9BEC-CD39BA132309"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "163FE96E-DF5B-4B67-8EDE-44A5B9A8492D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FBB16DC4-CDC9-4936-9C6A-0ED8E1F6D056"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn5021_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B0F7D48A-7D06-46C5-A093-FAA12666A666"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn5021:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "58DF7FA9-72B4-454D-AED7-ED9531B118BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "478B79F0-D257-41B2-965B-3E251A584D45"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8B6D2C9D-1BF9-4D78-90FB-B7633DD87E67"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "85740DB4-3B08-48A4-ACAF-7BBB2612009A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A0BD404-5EBA-4988-91B6-ECE8FCF4F041"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn5121_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F7582D75-412A-4CF8-9507-FB9AD10FBCC0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn5121:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E1CA0C2-13AD-4D4F-9FCD-882E2045D871"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "290BFC8A-0D76-4BCD-B059-2DAFD368A10C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "936A308A-92B9-468C-9BC6-8FD71C7C2315"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0EAE1EBF-AD14-4C07-99B5-2547A5196B20"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D4829FF9-C0BA-4E40-A01A-3EF179462029"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "63FF89C5-3BBF-4A13-8A3B-F490C2FA1A95"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6784EC5F-2C26-49C5-9A03-6FD2056C04EF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F466A5BD-1912-4811-9A93-81555F101D46"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0F92914E-16F6-4A25-9FEF-FB7CB3377132"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5BCCFF8B-4857-439D-BD4A-EB35672F474B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "86896D55-89F5-440B-9082-916E486B65D9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "02BA009F-24E1-4953-BA95-2A5BC1CDBDBB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9013_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D1EC8266-96C3-44F2-B9FA-5A5E0815565B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9013:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F4612E3-E1C9-4225-A5E9-C854BF3FA28D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "36A10EB2-E7A2-461F-836E-FC38B9428C98"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A457C1D6-A026-4B5F-9CB1-FA795785A515"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2C10CAAC-FD93-4116-9F0C-E983B3693FAF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FEC2402-BA39-49BB-A34C-FF32ED44A158"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "809FD84D-11C5-4EE3-B830-62CF5F6CB1BC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DFD77A52-D53C-424F-9E17-160B710469C3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9129A244-AB8C-4AA4-BFBB-37F84D66BD3E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "41F243A1-3C0B-4780-95BF-69A4E1A91F18"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76E03AE9-2485-449B-BCFD-3E452BB01FC6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFCB9F22-57F2-4327-95B9-B2342A02E45E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6DA2C3E1-E285-4CAD-9FA3-813C8EC436F6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F68F9B33-6BA5-46E1-A370-547CDA626985"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs8155_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "487E7EA3-CE9C-4DB9-97D9-A74406C8BC9B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs8155:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "644A4FF4-1494-480B-BDBA-22CC13C4E8EF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2D13E375-0562-4263-8452-53E117F14E83"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "407EE4D5-1F52-40D6-B85A-E49915D6EF2D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qdu1000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5846C9DD-63E5-482D-BE01-3A1E89CC0EDE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B6A4AA9-E35B-4B25-9FD3-BFB907B822DB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qdu1010:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5AC8538B-6663-4CF7-BD4A-9766C04CBAB5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7F5F9F3D-1F57-4D16-972E-AF39E438E4C3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qdu1110:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "53D6BEFE-AA21-4786-B11C-A6683AC06622"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "32E0EBD5-A846-44F9-9DEC-1C6711C96A5B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qdu1210:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C68F8102-788C-4EF3-83E4-56DF764DFFBC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B7AB84B-55D0-45EB-ABA8-F69E5179507E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qdx1010:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B908A65E-F3B2-417A-91EE-1BE855BABD2E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6554B2E1-AE96-40CE-A19F-C7516CDBC41A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qdx1011:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1991232B-B58F-481E-A7EE-0546E64C12CC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8ECC6966-23CF-4189-81B3-477A97E38B05"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qru1032:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "01490429-D26C-4F80-83A4-8DC257142B86"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0EAAB699-BFDA-465B-9B82-5E957C67D52A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qru1052:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0D2C3994-110F-40FA-B60F-D2C85A36E256"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7C81773C-4A1C-4589-A6FD-A85770F3ADFE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qru1062:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CABCCB94-8C93-4CF1-9EA1-D410FF6ACD72"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8C194363-7FDE-43C9-B6FE-2BD6B474816F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8CC9433-6B33-4B9C-8EC3-BBBB43897E5C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1894F6B9-31DA-44E8-AA28-064F73EBEE8D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8AA23845-D9F5-4035-8A93-F475D865586F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qts110_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B2D4B026-2118-448D-A48D-36864DE715B8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qts110:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5ED10480-E005-452C-A03C-D669CE94ABE4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5AEA324C-69CE-4AAC-91D6-6FAAE1B3FA77"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A7B5F5CD-CE26-4C93-9FED-F783947DBDA6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F357160-9EF0-4150-893B-746289C071AD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc5_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D3429F7D-C5C7-488E-8E32-518838C51621"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:robotics_rb3_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "85FE8AF5-3747-40D0-9DE3-5A77E05251C6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:robotics_rb3_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB7865B5-FAD2-4FC3-B708-0EE4AA4E4EB1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCA73E75-F339-49BA-B1F6-619E4630DE92"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:robotics_rb5_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5DA6E940-1059-4EA2-8225-0F754FE9F50F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A558A868-1B67-48D2-8A94-FDEA7126FAE7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7964A762-467B-47D7-865F-30D48A0AE47C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2D6F8899-136A-4A57-9F02-BD428E1663DA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "75AFAA21-0589-4C6A-9418-34EE8A61BBAD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C819454D-D413-478A-B78D-CFF6994803A1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "14E3FE58-7F1C-4F5C-B62D-0CF124E14AB2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFCB0BBA-3F81-4FCA-B3DE-190C46DA50DB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "589C1001-E9F6-41A6-BCC8-A94A3C97F2E6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "33D393A6-4586-4416-86EB-F9D86DC3DED8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A71D1A7C-537F-458B-BA56-A11F95E36EA9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "716DEC4D-D854-44CD-8A14-AA5AFD96809E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "52036768-810C-40C2-9213-8397A4073703"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE8AB22C-54EA-4D61-B6F9-7BC45820D29E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C7BE7001-5539-4C5E-A064-6E62023803AE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06661DAC-5D22-433E-B5EC-486931E265B4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B8DA94C-23A0-4C99-9F05-144B9B5224B3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "39E10E22-E7CC-41D6-80F3-030083F45645"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1497D052-884E-496B-BEF8-6904A25125ED"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "589F4888-28F6-4ECA-860E-8054C2A8C419"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC4DA7EA-DB81-4C71-A875-2612D8D7D726"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "48F26F64-98D4-420A-8918-E5E56ABA1D47"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "18431C93-7497-4A2C-9B5A-B9E4C7F88B7D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0BF0FFBA-73EC-4615-98D2-BA62D67353DB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sdx65m_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "08C59BD9-8629-467F-9C1C-F2232C821DDB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sdx65m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E7510FC-E89C-4EE4-84AE-8002E48937D2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFA7BB42-305C-451F-92D8-0718DF68A012"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2B93301-AFE8-409B-A8C8-6754BE5A0C14"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B185412C-177F-48E2-87F9-1269E0FB8E31"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FACA2BF1-85D3-447F-A08D-B90330A22550"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2ABA18D-82C1-4366-B1D7-DED42DD3D5C5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E3FB2972-94B6-4716-BA96-4B452BA3990F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "57F4F872-094E-4E27-BB89-D8251FAFB713"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "57B0086F-5F2C-4F89-AC53-D8429D6506CD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:smart_audio_400_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB8145C8-D978-4047-9203-602E854E7290"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2CCBF666-CB4E-44E1-9676-6891EDC73578"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C767AB6A-1A8C-406C-A600-96A816F44E2F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "390D7CAF-6C0B-4438-AA7D-AEEE127F4D3C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_460_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5BB1FC5E-CF6F-4E54-B78D-C01AFD034903"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA3F11F3-C9F4-460D-BD77-1BFBCC1F0592"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "25673A10-D99C-4F67-BDA7-9C2E4A70EF9C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50906EF2-01F7-4E97-9F49-F892DF41CB29"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B23A89FF-9C94-40C6-B9B7-3E8354777916"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "37DF4D73-3ACC-41B3-8CA4-20DAECE6BFB7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_662_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE08D23A-2D0D-4472-8847-27B955F55165"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_665_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9151A7D-4A02-4EDD-830E-3408BBB2B0C3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_665_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "73D551AC-1008-444B-8A69-CF8CE60942FF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_670_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C9871C72-4B99-43E5-B389-EB26996B08DD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_670_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "586E725A-B3F6-4C4D-AE46-0D76A0C0D91E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_675_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ABF96A66-FECF-4D2F-94C5-7BFC746789E5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_675_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28638583-F98D-4B88-AF50-A10642D6A105"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_678_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E1B3C6D8-F06D-48DE-9127-0E574578E501"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_678_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A933F383-717C-4D7B-836A-76042F55488F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8D0ED00F-1345-43AD-83C6-E979890B84AB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92C28019-B57D-4487-B551-F7B53395C6E5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C174F07D-0E33-43FD-9BAD-6C6D8B51B6A6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47311B68-A07F-448B-99D5-9C92C8127A81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A930E317-7F22-4605-A85F-144921EEBA0C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BAF50FDA-47FA-491B-BEAE-76CC38C18F52"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A9A2DA11-5E4E-4E36-923C-A2D3CC2F2751"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE7DFAD4-1D21-4A3A-9E8C-10F00AD7C403"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_710_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1FEAB1AE-53FE-4641-A2BB-4E1449A76E8C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_710_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3E92D896-80E5-47C6-A752-F19F1CB8005D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_712_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C9B4C948-7C2F-41E5-8111-9A17673E2787"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_712_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2504D653-29C7-4F1F-991C-AA50A4E5E092"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E6B6B409-33F8-49CA-9A09-3AA97DCBCE54"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_720g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1F34AF35-8A0B-4B90-8AE6-EC961B7FEC4B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BAE7612E-5C12-467E-95EC-90D0A984E086"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_730_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D76005A3-22FC-45C1-A01A-8640F030E6A9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_730g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E454506E-21BE-4BC9-91B9-21DC2AEA63E3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_730g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7D06996C-0832-4406-9581-1327345E95B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_732g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A0E3DAEC-1C6C-41D4-867D-A246C51A7F08"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_732g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B4E25E7B-7391-479A-AE10-E593ADF7A5B1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A96C773B-B228-4A39-8CAE-AEA0EE6E5699"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "898FE463-291B-4C89-BEC5-8B99EA18CF23"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C9940B4-672B-4D82-B904-80A3FC1DD4C2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11ADEB65-9803-4036-AAB4-B85E430B626D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD14F17B-FDC3-4B1B-9901-E40B783E77C6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8FD2424-599C-4137-9BB0-378F34B7AB3C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6037264-BF88-4BCA-9F5F-B5D30587D9A8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BABB84B3-C5BC-4AE9-AB6E-BA4BAF9FBECB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "87ECCB82-B880-412D-A635-CA6F0B035F2B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "424743C4-CE74-4A02-835A-023C9DA0CFAC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "14EA48BF-BD65-43B2-8DC1-D97F75AD6FE5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B86E317F-12BF-42F6-879B-88A85F7E3F81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4C68227-8928-41C4-A6B8-CD142C018AB6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "38E60ED4-9FB7-481E-915B-B7576566E0BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "194A4BD4-0DDF-49E5-AA89-40A5BFB71933"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72FF9732-40D8-4C12-8259-BAA16FAB5A56"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_compute_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65B3644E-74B5-41BB-BA43-F3E588D152CE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c_compute_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "75F10C87-25C4-40A5-9B7E-904C2258CB3C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_gen_2_compute_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC68355A-3202-4317-9767-26AFDD321789"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c_gen_2_compute_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF331899-4AA1-4D55-B494-4FA47BB97AE5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D56B0CD3-138D-4197-84D5-2887C8FA40D2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_845_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E289B26-AF53-442A-9740-2F44D1F59DA5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_850_mobile_compute_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "355080DC-FC83-45C1-AB1A-21533638C181"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_850_mobile_compute_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5167E425-3B5D-4F79-B6AF-599820BEB33E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF26AC15-F805-4FEB-9CFC-BD530FA114F6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "17A6D87A-544D-4B8E-884A-0117C499DD8D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C9F4285-1F09-40CD-B1AA-84B406FD6A71"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8623DD44-DFDD-442D-9789-11A527A450A4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22303AD4-779C-45A3-8F33-3864C45E4328"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EC440D-D420-4477-8F14-427245B80631"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "41446A77-6EF3-4570-BAD2-4C761A2C4E7F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "448C401B-EF07-4385-A7B4-123D7808F64F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22A78236-5965-4F65-9001-3FE7FF6D27E8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "414C5C1D-A5DA-47C7-B6C9-3564DD4DD911"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "01CBD543-635C-4C57-87B7-55DD3BA3C1A2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A7272B6-AADB-4CCD-B041-66170C313C76"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-ad_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9AEC3A05-8F33-4028-B7A8-9EBA236FDA9E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-ad:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6D997EED-E10B-446E-8B51-5D3C611E0F62"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-ad_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A27DE47-C6D7-4E24-9041-08D8444DDAD7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-ad:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1EBDF16D-8B58-4031-9C51-424D155336F5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-aa_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "039AEC8D-9372-4737-B846-CBF1F23ADCAA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-aa:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4306FDC5-6F33-4462-B5B0-27125DFD9F5A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-ac_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "073ED3B4-6ADE-4E7F-A797-523DA85AF09C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-ac:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "156A1CD6-2827-4D0C-B8F4-FB0C7774CD75"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-ac_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B28A559B-EA1A-408C-9C92-8CF8A62397CE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-ac:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F22559E6-CB6A-48BD-8E30-7B4E2CA7B7A6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-aa_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "00CB649A-DA70-4713-98B0-883CC404E5DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-aa:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3F8F9C8A-6E84-40C9-A0B9-21AAF60E43E7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8280xp-ab_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "19CDBCF0-01C7-4D9D-A896-283C3B21512B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8280xp-ab:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "79D59603-1A41-4CE3-A5C3-5A2EBD1BA1A2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB6053F0-5E34-458A-B084-078E4D4F4021"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_1300_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5A402233-B76F-41D5-B7C2-325C8FC4D560"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_1300_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C8643194-C881-408A-AAA1-78572075120A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x24_lte_modem_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CAB1351-A614-4E73-B58E-7D624695C657"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x24_lte_modem:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4494AAD7-D132-41DB-9756-CAD1F3F7AE7E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69D1567F-D669-4415-9A08-110221EFA6BA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x50_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EF808C56-AD46-4351-9A46-6A2B6AAAB5BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EAD88351-1DA2-4CE5-BCEB-3C64BD16468A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03149AA1-8048-4675-8C6F-18FD32E54064"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1E1B7FD-39CD-42AB-A113-2AFB25B5F85B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C93EECE3-7A8A-4B58-A674-134040CE43FE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF9740EB-F82E-42EA-993E-A393B05CC6BB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "022A5532-03F7-4FB8-BA0D-4221178C9486"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_4g_modem_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3C8F12FE-0057-4A13-9A7F-D12C114ECEF9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_4g_modem:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1271B0C7-2D91-4129-9B58-E6689DD68C39"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2BA4BA00-C8D1-4DAC-8030-CB5EEC7D4591"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EDC270A7-205C-41EB-A2E5-2A381A16BFBB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CF839E24-6542-4C5D-A1B7-FD3BA00683CB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr1120:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E9F12284-93E0-482D-9D35-EB38BA7D6C6D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E1753FC-F3CD-4B50-886D-8E16D9301A84"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3E20681-4FC4-46E2-AF77-BCF03BC8E77E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_300_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1708266E-EB99-475A-AB48-B2ACEE5657EC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_300_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FEBBF98A-40C2-4386-85C5-5B1D445CC846"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6E685A5C-870C-41E9-91AA-7AA7535C4D85"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_400_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8F52FE7-2C9C-4908-A578-2230ED6A1505"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FC012AD0-BCEE-4B1E-9B15-5D77D78CEA01"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F51C69B9-F0AB-4BF5-A8C2-64FEB7075593"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4D6C6B2-36DC-4D0D-AFF8-2108A090A78D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28FEB3B1-F641-436D-AC4F-3304C37167C4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2503805B-B2A6-4AEE-8AB1-2B8A040702BD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D3AD370C-2ED0-43CF-83D9-50DC92A01CA5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DF49BC31-A332-4B9A-A826-F63116D7029F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6DD3C245-D5F8-4145-8CDF-F635D2C8F088"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin",
- "source": "product-security@qualcomm.com"
+ "source": "product-security@qualcomm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28586.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28586.json
index 3b02f13dc54..ef9fa8c1945 100644
--- a/CVE-2023/CVE-2023-285xx/CVE-2023-28586.json
+++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28586.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-28586",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-12-05T03:15:09.750",
- "lastModified": "2023-12-05T13:51:04.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:11:28.417",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.0,
+ "impactScore": 4.0
+ },
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
@@ -38,10 +58,8478 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-119"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:9205_lte_modem_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "920F873B-F52D-4754-9726-BECCAD0CAC45"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:9205_lte_modem:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5EB573E2-C2B9-4B12-9EEF-9152FBFE3927"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:c-v2x_9150:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B80D6366-4C0C-4C0D-9A38-769C66D62F0F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1AA32CC0-DE30-4B15-8EC6-1FAF14C5C4E2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "770F3924-BE27-4BDE-B922-680B3C9753EB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fsm10056_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0EF47C0-45AA-4B1C-B9E8-A83E5D9938F9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fsm10056:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A78E2A04-CD5D-4963-A45D-B111DD5E0B44"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:home_hub_100_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "08E5DFB7-9516-4019-8F74-D9584BC01D23"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:home_hub_100_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F2EDB814-A56C-4A85-B8AB-566D42BC9EB5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1AA3313-749F-486B-8212-33E569377C2B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:immersive_home_3210_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B6F6D44F-BD86-44B9-BE5D-471D33F0438D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7BB0662A-2D27-4AE7-8370-0B567B9A8214"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:immersive_home_326_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67970B89-2F06-4E4A-88CA-9D37C060C1BA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq5332_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A795F64D-6DE9-4D56-AA22-D77470B9E5AD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq5332:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "32521715-D9BF-4A86-BE4B-D9BB29C133F0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA7A5C46-48BF-42A9-A477-A660C6D7B437"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EDB79382-19D6-4A67-9013-7099A9C58829"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq6005_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4695A9D-A02C-4E73-A327-E811C55B4EDF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq6005:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28E41848-525C-4126-89C2-54BD193768DB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A5CF970F-17AE-4C59-89A5-5B41A41E1DE0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "71C54A70-AAA8-4B5E-AC1B-471A5C7E79B0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B04589FF-F299-4EF6-A57B-1AD145372DBB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FDC1ADAD-DA77-47EF-8DB9-C36961C560C2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06126F30-D081-4A11-92FB-4074A451FAF9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2550040-CCC7-4B52-8D3E-7948B3E3C62B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "78A6F4F3-0CE3-4A02-B615-63E76C93ADC4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "31D07608-80F7-44AA-BE91-1F97FC1CE313"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq9554_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C656780-05E9-40D5-936B-B73ECE9E0330"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq9554:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD2DF80E-E546-473B-AE26-594CFB8A87A8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq9570_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A6182C0-AAE7-45A9-8ECB-F198B55181AB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq9570:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "61FC3830-8AAF-4836-89C3-2C6355CC0272"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0327D8C9-DD6B-4831-BBD4-2EE57A351493"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0C866E83-23ED-495C-AA5A-0B01973674BF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:mdm9205s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0AEA758D-ECAD-4973-9586-2621CC3B2BA2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:mdm9205s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D4F1EED8-567D-4E1B-92D6-37ADE97B06FC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA44E1D7-C4B5-4A1C-8D89-C080856104EE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:mdm9250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "268F94E5-15A2-4BCA-BE1B-0B6A7179B9C9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ADC6FBEE-D2FA-4660-A078-D6CE2097653D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6BD8A1C-D9AB-4BE7-A855-31E58631879C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2C8807E9-5972-47E7-8B39-2E4D68C7B79E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:msm8108:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "57963412-14B9-4C0D-AA0D-6928445DB808"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:msm8209_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29F64FA7-5EA1-4C91-B409-4A0E966FBD26"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1FBCA5AB-07E4-404E-A278-28F6004D2126"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:msm8608_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99AE9AEA-4D9F-4879-85F7-405279EFE5ED"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:msm8608:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDED3AA7-576C-4437-A466-D627698F4242"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca0000_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC941093-1A7C-47B2-AB3B-05AE4AE2FBE4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca0000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7A2AA834-C17C-4E0E-A510-795818041E47"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DFB39496-8699-4DAF-BD7B-AE69260B20CB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E9CFBC24-5F15-40DE-806E-62C1EE808992"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C359D1E7-6E0A-41B5-ABE5-B55598960700"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B4DC3CE7-0C4A-458B-A42E-8F80C062DD5F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6234_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "912215EB-CF3C-4AA4-B3F5-2EB19B131427"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6234:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B2C7FE6F-6106-4EF3-9925-95B25D047418"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B0F8ED6-EAE7-44EA-A8C6-F5AD408261F0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "886CF046-E1D9-4FD4-AC02-EAB61C3F70FD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "059486E9-3F99-4C65-A763-470564EDAF2C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "966CDA56-809F-4FF4-909D-0DD92F44CF67"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C90747B4-2CC0-4816-A994-58E00F5ADA05"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "00FE294D-4BE0-4436-9273-507E760884EC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "424CB795-58E5-43A4-A2EC-C563D93C5E72"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93ED74CE-6BF2-4983-8780-07D5336745B3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11405993-5903-4716-B452-370281034B42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BFC575E-594E-4711-94B1-2DC8D03B9AC4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8072_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1F4012FC-F0D9-41DE-BC2A-FBDD1B212540"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8072:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B16C4C53-F8BA-48D2-A7EE-90A06499722D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC8A5A87-7D62-4EB7-962A-0F160DE3E889"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7B68D126-7F49-4FFA-8AF8-78120973D78E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB1F2E8B-1ED2-473D-AFD8-F2590F6BD414"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FBDA9657-7D30-41FD-8112-F53E6C69D53A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1B9045A8-BA53-43C4-B24D-5EF320DE7A4A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3D6E8939-AFA3-41AC-B811-BCC282A43106"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B87335A8-DC52-478E-B19F-0C4CC63132EA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99C34523-FE2A-4DDC-9A8A-D9072F3D0FD3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "08E9E6CB-2216-4AF2-81C2-D482598298BE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4774FAA6-6141-4B08-819C-58D4D9A2B69F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2AD0E09B-92EC-4974-BC5F-66C3AAF586B1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FBA48AB-85F4-4D6C-B811-87756B80FFB8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98E58C63-F253-4DCC-8A14-48FEB64B4C3D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "25565FDA-651D-4A05-8B1E-2188B6921253"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8D49750-BBEA-4A3D-9898-28B7A50A7F42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93BA2DC9-5B4F-4F8F-8B3D-8DA01043B9BD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FA8880F-E513-4390-B839-C5D86E7A89EB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcf8000_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9A05AC12-9E7A-4837-A447-1718396011FC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcf8000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8E3FF297-D849-45AE-AAB8-DDEA64A23FF3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "287199B4-9CBB-4290-BDB3-ABBB41794259"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcf8001:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "142DC510-DD92-4174-8B37-4D239573661E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "214A053F-D80C-4AD9-B4F1-83384095A3F3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "74EBA77E-69A5-4145-9BEC-CD39BA132309"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "163FE96E-DF5B-4B67-8EDE-44A5B9A8492D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FBB16DC4-CDC9-4936-9C6A-0ED8E1F6D056"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn5021_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B0F7D48A-7D06-46C5-A093-FAA12666A666"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn5021:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "58DF7FA9-72B4-454D-AED7-ED9531B118BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "478B79F0-D257-41B2-965B-3E251A584D45"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8B6D2C9D-1BF9-4D78-90FB-B7633DD87E67"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "85740DB4-3B08-48A4-ACAF-7BBB2612009A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A0BD404-5EBA-4988-91B6-ECE8FCF4F041"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn5121_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F7582D75-412A-4CF8-9507-FB9AD10FBCC0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn5121:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E1CA0C2-13AD-4D4F-9FCD-882E2045D871"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "290BFC8A-0D76-4BCD-B059-2DAFD368A10C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "936A308A-92B9-468C-9BC6-8FD71C7C2315"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0EAE1EBF-AD14-4C07-99B5-2547A5196B20"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D4829FF9-C0BA-4E40-A01A-3EF179462029"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "63FF89C5-3BBF-4A13-8A3B-F490C2FA1A95"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6784EC5F-2C26-49C5-9A03-6FD2056C04EF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9C9D1966-30F0-414D-BE75-0A14B12A1457"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD28C87D-1D28-4C84-BFE4-56EE3BF2C6B0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F466A5BD-1912-4811-9A93-81555F101D46"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0F92914E-16F6-4A25-9FEF-FB7CB3377132"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5BCCFF8B-4857-439D-BD4A-EB35672F474B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "86896D55-89F5-440B-9082-916E486B65D9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "02BA009F-24E1-4953-BA95-2A5BC1CDBDBB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9013_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D1EC8266-96C3-44F2-B9FA-5A5E0815565B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9013:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F4612E3-E1C9-4225-A5E9-C854BF3FA28D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "36A10EB2-E7A2-461F-836E-FC38B9428C98"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A457C1D6-A026-4B5F-9CB1-FA795785A515"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2C10CAAC-FD93-4116-9F0C-E983B3693FAF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FEC2402-BA39-49BB-A34C-FF32ED44A158"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "809FD84D-11C5-4EE3-B830-62CF5F6CB1BC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DFD77A52-D53C-424F-9E17-160B710469C3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9129A244-AB8C-4AA4-BFBB-37F84D66BD3E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "41F243A1-3C0B-4780-95BF-69A4E1A91F18"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76E03AE9-2485-449B-BCFD-3E452BB01FC6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFCB9F22-57F2-4327-95B9-B2342A02E45E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6DA2C3E1-E285-4CAD-9FA3-813C8EC436F6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F68F9B33-6BA5-46E1-A370-547CDA626985"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs8155_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "487E7EA3-CE9C-4DB9-97D9-A74406C8BC9B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs8155:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "644A4FF4-1494-480B-BDBA-22CC13C4E8EF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2D13E375-0562-4263-8452-53E117F14E83"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "407EE4D5-1F52-40D6-B85A-E49915D6EF2D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qdu1000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5846C9DD-63E5-482D-BE01-3A1E89CC0EDE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B6A4AA9-E35B-4B25-9FD3-BFB907B822DB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qdu1010:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5AC8538B-6663-4CF7-BD4A-9766C04CBAB5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7F5F9F3D-1F57-4D16-972E-AF39E438E4C3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qdu1110:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "53D6BEFE-AA21-4786-B11C-A6683AC06622"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "32E0EBD5-A846-44F9-9DEC-1C6711C96A5B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qdu1210:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C68F8102-788C-4EF3-83E4-56DF764DFFBC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B7AB84B-55D0-45EB-ABA8-F69E5179507E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qdx1010:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B908A65E-F3B2-417A-91EE-1BE855BABD2E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6554B2E1-AE96-40CE-A19F-C7516CDBC41A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qdx1011:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1991232B-B58F-481E-A7EE-0546E64C12CC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8ECC6966-23CF-4189-81B3-477A97E38B05"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qru1032:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "01490429-D26C-4F80-83A4-8DC257142B86"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0EAAB699-BFDA-465B-9B82-5E957C67D52A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qru1052:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0D2C3994-110F-40FA-B60F-D2C85A36E256"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7C81773C-4A1C-4589-A6FD-A85770F3ADFE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qru1062:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CABCCB94-8C93-4CF1-9EA1-D410FF6ACD72"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8C194363-7FDE-43C9-B6FE-2BD6B474816F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8CC9433-6B33-4B9C-8EC3-BBBB43897E5C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1894F6B9-31DA-44E8-AA28-064F73EBEE8D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8AA23845-D9F5-4035-8A93-F475D865586F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qts110_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B2D4B026-2118-448D-A48D-36864DE715B8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qts110:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5ED10480-E005-452C-A03C-D669CE94ABE4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_205_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8F2B255-04B5-4982-8018-F43EDD4F7912"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_205_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D4DE45CB-E697-489D-BFCA-1BBA48FF0846"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5AEA324C-69CE-4AAC-91D6-6FAAE1B3FA77"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A7B5F5CD-CE26-4C93-9FED-F783947DBDA6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F357160-9EF0-4150-893B-746289C071AD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc5_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D3429F7D-C5C7-488E-8E32-518838C51621"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:robotics_rb3_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "85FE8AF5-3747-40D0-9DE3-5A77E05251C6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:robotics_rb3_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB7865B5-FAD2-4FC3-B708-0EE4AA4E4EB1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCA73E75-F339-49BA-B1F6-619E4630DE92"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:robotics_rb5_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5DA6E940-1059-4EA2-8225-0F754FE9F50F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A558A868-1B67-48D2-8A94-FDEA7126FAE7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7964A762-467B-47D7-865F-30D48A0AE47C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2D6F8899-136A-4A57-9F02-BD428E1663DA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "75AFAA21-0589-4C6A-9418-34EE8A61BBAD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C819454D-D413-478A-B78D-CFF6994803A1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "14E3FE58-7F1C-4F5C-B62D-0CF124E14AB2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFCB0BBA-3F81-4FCA-B3DE-190C46DA50DB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "589C1001-E9F6-41A6-BCC8-A94A3C97F2E6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "33D393A6-4586-4416-86EB-F9D86DC3DED8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A71D1A7C-537F-458B-BA56-A11F95E36EA9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "716DEC4D-D854-44CD-8A14-AA5AFD96809E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "52036768-810C-40C2-9213-8397A4073703"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE8AB22C-54EA-4D61-B6F9-7BC45820D29E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C7BE7001-5539-4C5E-A064-6E62023803AE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06661DAC-5D22-433E-B5EC-486931E265B4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B8DA94C-23A0-4C99-9F05-144B9B5224B3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "39E10E22-E7CC-41D6-80F3-030083F45645"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1497D052-884E-496B-BEF8-6904A25125ED"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "589F4888-28F6-4ECA-860E-8054C2A8C419"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC4DA7EA-DB81-4C71-A875-2612D8D7D726"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "48F26F64-98D4-420A-8918-E5E56ABA1D47"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BC508C49-0B76-43A8-B2AF-0F8EB989E238"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E9665200-D306-4EEB-9F42-6C5963524179"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd821_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4A54F4A3-19E3-4825-98C7-DA632D692A06"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd821:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "028CD81A-0D9D-40B0-9E2F-DC8689607B24"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "18431C93-7497-4A2C-9B5A-B9E4C7F88B7D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0BF0FFBA-73EC-4615-98D2-BA62D67353DB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sdx65m_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "08C59BD9-8629-467F-9C1C-F2232C821DDB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sdx65m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E7510FC-E89C-4EE4-84AE-8002E48937D2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFA7BB42-305C-451F-92D8-0718DF68A012"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2B93301-AFE8-409B-A8C8-6754BE5A0C14"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B185412C-177F-48E2-87F9-1269E0FB8E31"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FACA2BF1-85D3-447F-A08D-B90330A22550"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2ABA18D-82C1-4366-B1D7-DED42DD3D5C5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E3FB2972-94B6-4716-BA96-4B452BA3990F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "57F4F872-094E-4E27-BB89-D8251FAFB713"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:smart_audio_200_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE9BAA26-7377-4D96-965C-1CD54FD487B1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:smart_audio_200_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "306C7C27-1363-4FF6-AC71-BB8DB908D058"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "57B0086F-5F2C-4F89-AC53-D8429D6506CD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:smart_audio_400_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB8145C8-D978-4047-9203-602E854E7290"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_208_processor_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0CC78837-E44B-4D03-A9B1-C3494D823207"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_208_processor:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DF94E560-681D-48E7-9429-9B4BDB89393B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_210_processor_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2C8490C5-0F0C-4AC6-A80F-06EF08E8C39E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_210_processor:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "680B7C89-F3C0-49DA-A73E-CCDCF0A71CF0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_212_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70E745D7-3E43-42B1-9CBE-CA53846D0660"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_212_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "13DA9023-07FE-46B5-9F3B-D6A2C5AED241"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2CCBF666-CB4E-44E1-9676-6891EDC73578"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C767AB6A-1A8C-406C-A600-96A816F44E2F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "390D7CAF-6C0B-4438-AA7D-AEEE127F4D3C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_460_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5BB1FC5E-CF6F-4E54-B78D-C01AFD034903"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA3F11F3-C9F4-460D-BD77-1BFBCC1F0592"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "25673A10-D99C-4F67-BDA7-9C2E4A70EF9C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50906EF2-01F7-4E97-9F49-F892DF41CB29"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B23A89FF-9C94-40C6-B9B7-3E8354777916"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "37DF4D73-3ACC-41B3-8CA4-20DAECE6BFB7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_662_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE08D23A-2D0D-4472-8847-27B955F55165"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_665_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9151A7D-4A02-4EDD-830E-3408BBB2B0C3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_665_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "73D551AC-1008-444B-8A69-CF8CE60942FF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_670_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C9871C72-4B99-43E5-B389-EB26996B08DD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_670_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "586E725A-B3F6-4C4D-AE46-0D76A0C0D91E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_675_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ABF96A66-FECF-4D2F-94C5-7BFC746789E5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_675_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28638583-F98D-4B88-AF50-A10642D6A105"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_678_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E1B3C6D8-F06D-48DE-9127-0E574578E501"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_678_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A933F383-717C-4D7B-836A-76042F55488F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8D0ED00F-1345-43AD-83C6-E979890B84AB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92C28019-B57D-4487-B551-F7B53395C6E5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C174F07D-0E33-43FD-9BAD-6C6D8B51B6A6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47311B68-A07F-448B-99D5-9C92C8127A81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A930E317-7F22-4605-A85F-144921EEBA0C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BAF50FDA-47FA-491B-BEAE-76CC38C18F52"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A9A2DA11-5E4E-4E36-923C-A2D3CC2F2751"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE7DFAD4-1D21-4A3A-9E8C-10F00AD7C403"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_710_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1FEAB1AE-53FE-4641-A2BB-4E1449A76E8C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_710_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3E92D896-80E5-47C6-A752-F19F1CB8005D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_712_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C9B4C948-7C2F-41E5-8111-9A17673E2787"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_712_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2504D653-29C7-4F1F-991C-AA50A4E5E092"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E6B6B409-33F8-49CA-9A09-3AA97DCBCE54"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_720g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1F34AF35-8A0B-4B90-8AE6-EC961B7FEC4B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BAE7612E-5C12-467E-95EC-90D0A984E086"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_730_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D76005A3-22FC-45C1-A01A-8640F030E6A9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_730g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E454506E-21BE-4BC9-91B9-21DC2AEA63E3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_730g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7D06996C-0832-4406-9581-1327345E95B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_732g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A0E3DAEC-1C6C-41D4-867D-A246C51A7F08"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_732g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B4E25E7B-7391-479A-AE10-E593ADF7A5B1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A96C773B-B228-4A39-8CAE-AEA0EE6E5699"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "898FE463-291B-4C89-BEC5-8B99EA18CF23"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C9940B4-672B-4D82-B904-80A3FC1DD4C2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11ADEB65-9803-4036-AAB4-B85E430B626D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD14F17B-FDC3-4B1B-9901-E40B783E77C6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8FD2424-599C-4137-9BB0-378F34B7AB3C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6037264-BF88-4BCA-9F5F-B5D30587D9A8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BABB84B3-C5BC-4AE9-AB6E-BA4BAF9FBECB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "87ECCB82-B880-412D-A635-CA6F0B035F2B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "424743C4-CE74-4A02-835A-023C9DA0CFAC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "14EA48BF-BD65-43B2-8DC1-D97F75AD6FE5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B86E317F-12BF-42F6-879B-88A85F7E3F81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4C68227-8928-41C4-A6B8-CD142C018AB6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "38E60ED4-9FB7-481E-915B-B7576566E0BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "194A4BD4-0DDF-49E5-AA89-40A5BFB71933"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72FF9732-40D8-4C12-8259-BAA16FAB5A56"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_compute_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65B3644E-74B5-41BB-BA43-F3E588D152CE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c_compute_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "75F10C87-25C4-40A5-9B7E-904C2258CB3C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_gen_2_compute_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC68355A-3202-4317-9767-26AFDD321789"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c_gen_2_compute_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF331899-4AA1-4D55-B494-4FA47BB97AE5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_automotive_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22B3AB46-81F4-4C45-AF66-C8B36A175685"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_automotive_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A8198E0-C95A-4433-9EC0-F544CAA90251"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5799B243-F73E-483B-A2A4-6DB25AEBB08D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D534FDF-3084-4FAC-800E-D71497F9DDFB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_821_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D6A92FCC-A844-448F-9291-4E923ACA55E7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_821_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4CF4B1EC-D38A-4FAD-8A4E-D0521F66005E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "81FC1C9D-D494-4426-93FF-A774D68554D7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_835_mobile_pc_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B4837E0-EFF7-4546-918C-03551E03F6BD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D56B0CD3-138D-4197-84D5-2887C8FA40D2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_845_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E289B26-AF53-442A-9740-2F44D1F59DA5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_850_mobile_compute_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "355080DC-FC83-45C1-AB1A-21533638C181"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_850_mobile_compute_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5167E425-3B5D-4F79-B6AF-599820BEB33E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF26AC15-F805-4FEB-9CFC-BD530FA114F6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "17A6D87A-544D-4B8E-884A-0117C499DD8D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C9F4285-1F09-40CD-B1AA-84B406FD6A71"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8623DD44-DFDD-442D-9789-11A527A450A4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22303AD4-779C-45A3-8F33-3864C45E4328"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EC440D-D420-4477-8F14-427245B80631"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "41446A77-6EF3-4570-BAD2-4C761A2C4E7F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "448C401B-EF07-4385-A7B4-123D7808F64F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22A78236-5965-4F65-9001-3FE7FF6D27E8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "414C5C1D-A5DA-47C7-B6C9-3564DD4DD911"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "01CBD543-635C-4C57-87B7-55DD3BA3C1A2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A7272B6-AADB-4CCD-B041-66170C313C76"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-ad_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9AEC3A05-8F33-4028-B7A8-9EBA236FDA9E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-ad:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6D997EED-E10B-446E-8B51-5D3C611E0F62"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-ad_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A27DE47-C6D7-4E24-9041-08D8444DDAD7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-ad:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1EBDF16D-8B58-4031-9C51-424D155336F5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-aa_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "039AEC8D-9372-4737-B846-CBF1F23ADCAA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-aa:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4306FDC5-6F33-4462-B5B0-27125DFD9F5A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-ac_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "073ED3B4-6ADE-4E7F-A797-523DA85AF09C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-ac:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "156A1CD6-2827-4D0C-B8F4-FB0C7774CD75"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-ac_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B28A559B-EA1A-408C-9C92-8CF8A62397CE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-ac:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F22559E6-CB6A-48BD-8E30-7B4E2CA7B7A6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-aa_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "00CB649A-DA70-4713-98B0-883CC404E5DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-aa:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3F8F9C8A-6E84-40C9-A0B9-21AAF60E43E7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8280xp-ab_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "19CDBCF0-01C7-4D9D-A896-283C3B21512B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8280xp-ab:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "79D59603-1A41-4CE3-A5C3-5A2EBD1BA1A2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB6053F0-5E34-458A-B084-078E4D4F4021"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_1300_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5A402233-B76F-41D5-B7C2-325C8FC4D560"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_1300_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C8643194-C881-408A-AAA1-78572075120A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "05396B5E-C70F-4D83-84AA-7A7DB1B7B0E4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x12_lte_modem:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6E180EE7-5254-4C57-B4EE-BF2A9C21CA94"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x24_lte_modem_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CAB1351-A614-4E73-B58E-7D624695C657"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x24_lte_modem:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4494AAD7-D132-41DB-9756-CAD1F3F7AE7E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69D1567F-D669-4415-9A08-110221EFA6BA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x50_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EF808C56-AD46-4351-9A46-6A2B6AAAB5BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EAD88351-1DA2-4CE5-BCEB-3C64BD16468A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03149AA1-8048-4675-8C6F-18FD32E54064"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1E1B7FD-39CD-42AB-A113-2AFB25B5F85B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C93EECE3-7A8A-4B58-A674-134040CE43FE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF9740EB-F82E-42EA-993E-A393B05CC6BB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "022A5532-03F7-4FB8-BA0D-4221178C9486"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_4g_modem_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3C8F12FE-0057-4A13-9A7F-D12C114ECEF9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_4g_modem:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1271B0C7-2D91-4129-9B58-E6689DD68C39"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2BA4BA00-C8D1-4DAC-8030-CB5EEC7D4591"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EDC270A7-205C-41EB-A2E5-2A381A16BFBB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CF839E24-6542-4C5D-A1B7-FD3BA00683CB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr1120:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E9F12284-93E0-482D-9D35-EB38BA7D6C6D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E1753FC-F3CD-4B50-886D-8E16D9301A84"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3E20681-4FC4-46E2-AF77-BCF03BC8E77E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_300_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1708266E-EB99-475A-AB48-B2ACEE5657EC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_300_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FEBBF98A-40C2-4386-85C5-5B1D445CC846"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6E685A5C-870C-41E9-91AA-7AA7535C4D85"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_400_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8F52FE7-2C9C-4908-A578-2230ED6A1505"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FC012AD0-BCEE-4B1E-9B15-5D77D78CEA01"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F51C69B9-F0AB-4BF5-A8C2-64FEB7075593"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "43A90019-4E96-40B5-9E4D-CCBDD51ACA34"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BC3D23FE-B3D5-4EC3-8268-98F12181966D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4D6C6B2-36DC-4D0D-AFF8-2108A090A78D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28FEB3B1-F641-436D-AC4F-3304C37167C4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2503805B-B2A6-4AEE-8AB1-2B8A040702BD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D3AD370C-2ED0-43CF-83D9-50DC92A01CA5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DAFD64E7-3F13-4DCA-8C46-6E8FE0C6F798"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "044A14FB-64F6-4200-AC85-8DC91C31BD16"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9590EF1F-E821-4525-943B-4A315ACAEFFC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7A7D32B3-325E-4B1F-8649-3D0071396BBA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DF49BC31-A332-4B9A-A826-F63116D7029F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6DD3C245-D5F8-4145-8CDF-F635D2C8F088"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin",
- "source": "product-security@qualcomm.com"
+ "source": "product-security@qualcomm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28587.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28587.json
index b4457951fea..88d8b2ec512 100644
--- a/CVE-2023/CVE-2023-285xx/CVE-2023-28587.json
+++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28587.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-28587",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-12-05T03:15:09.927",
- "lastModified": "2023-12-05T13:51:04.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:52:13.027",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
@@ -38,10 +58,5157 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "770F3924-BE27-4BDE-B922-680B3C9753EB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca2062_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "54C350AB-526B-4681-9C37-DD508EFFB143"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca2062:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1ACBDBFC-796A-428E-9570-77E488FA1CB3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca2064_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E73670B4-1055-4C65-AD34-EB978ABB19A6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca2064:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C774D66F-60C9-46B8-BE1D-B8D61EE5E844"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca2065_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8C68AE99-4C8C-43AE-94AA-82632FD2BBE4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca2065:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E255A21F-EC50-436F-81D9-8B2AC56D9BCE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca2066_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6366F2ED-C6B7-4579-B304-C5B6DF951EB4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca2066:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "09B688AF-E1A4-496C-924C-D6B725CBBE26"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0B1397F3-8CCF-4BBA-9F0F-A12E4F045754"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F5888224-567D-4C84-BE6D-17B636BF506C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11405993-5903-4716-B452-370281034B42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C9EB615F-FD4C-450B-AB25-E936FD9816C4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BFC575E-594E-4711-94B1-2DC8D03B9AC4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E02CCE45-27E9-436A-A49F-F92B1C9B0926"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59A4483F-3A2A-4C31-AB38-A3147CC7D55A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "90EF18E5-6D32-4A75-95B8-DF41A5373DEB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6D3E2A00-5BFA-48A0-8DF1-DC33B2CA3DD7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcc711_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A20DED6B-1CEF-4FC8-A6C9-176E34322D5F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcc711:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F9CA40D-1164-4A00-A722-EC1FBE839705"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "214A053F-D80C-4AD9-B4F1-83384095A3F3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "74EBA77E-69A5-4145-9BEC-CD39BA132309"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "163FE96E-DF5B-4B67-8EDE-44A5B9A8492D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FBB16DC4-CDC9-4936-9C6A-0ED8E1F6D056"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9C9D1966-30F0-414D-BE75-0A14B12A1457"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD28C87D-1D28-4C84-BFE4-56EE3BF2C6B0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F466A5BD-1912-4811-9A93-81555F101D46"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0F92914E-16F6-4A25-9FEF-FB7CB3377132"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76E03AE9-2485-449B-BCFD-3E452BB01FC6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFCB9F22-57F2-4327-95B9-B2342A02E45E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6DA2C3E1-E285-4CAD-9FA3-813C8EC436F6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1894F6B9-31DA-44E8-AA28-064F73EBEE8D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8AA23845-D9F5-4035-8A93-F475D865586F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5AEA324C-69CE-4AAC-91D6-6FAAE1B3FA77"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A7B5F5CD-CE26-4C93-9FED-F783947DBDA6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A558A868-1B67-48D2-8A94-FDEA7126FAE7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7964A762-467B-47D7-865F-30D48A0AE47C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "75AFAA21-0589-4C6A-9418-34EE8A61BBAD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C819454D-D413-478A-B78D-CFF6994803A1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "14E3FE58-7F1C-4F5C-B62D-0CF124E14AB2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFCB0BBA-3F81-4FCA-B3DE-190C46DA50DB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "33D393A6-4586-4416-86EB-F9D86DC3DED8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3991C516-4FBE-43D8-835F-413FE45BF73E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9CF5EBB-B25A-4A76-B522-951F108263CC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFA7BB42-305C-451F-92D8-0718DF68A012"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2B93301-AFE8-409B-A8C8-6754BE5A0C14"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B185412C-177F-48E2-87F9-1269E0FB8E31"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FACA2BF1-85D3-447F-A08D-B90330A22550"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2ABA18D-82C1-4366-B1D7-DED42DD3D5C5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E3FB2972-94B6-4716-BA96-4B452BA3990F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "57F4F872-094E-4E27-BB89-D8251FAFB713"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "57B0086F-5F2C-4F89-AC53-D8429D6506CD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:smart_audio_400_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB8145C8-D978-4047-9203-602E854E7290"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2CCBF666-CB4E-44E1-9676-6891EDC73578"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C767AB6A-1A8C-406C-A600-96A816F44E2F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "390D7CAF-6C0B-4438-AA7D-AEEE127F4D3C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_460_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5BB1FC5E-CF6F-4E54-B78D-C01AFD034903"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA3F11F3-C9F4-460D-BD77-1BFBCC1F0592"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "25673A10-D99C-4F67-BDA7-9C2E4A70EF9C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50906EF2-01F7-4E97-9F49-F892DF41CB29"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B23A89FF-9C94-40C6-B9B7-3E8354777916"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "873CD3BE-2098-4328-B350-A14453C44F1D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_660_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE294B26-BBD0-455F-82B0-4605987B7DDC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "37DF4D73-3ACC-41B3-8CA4-20DAECE6BFB7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_662_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE08D23A-2D0D-4472-8847-27B955F55165"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8D0ED00F-1345-43AD-83C6-E979890B84AB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92C28019-B57D-4487-B551-F7B53395C6E5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C174F07D-0E33-43FD-9BAD-6C6D8B51B6A6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47311B68-A07F-448B-99D5-9C92C8127A81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A930E317-7F22-4605-A85F-144921EEBA0C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BAF50FDA-47FA-491B-BEAE-76CC38C18F52"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A9A2DA11-5E4E-4E36-923C-A2D3CC2F2751"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE7DFAD4-1D21-4A3A-9E8C-10F00AD7C403"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E6B6B409-33F8-49CA-9A09-3AA97DCBCE54"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_720g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1F34AF35-8A0B-4B90-8AE6-EC961B7FEC4B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A96C773B-B228-4A39-8CAE-AEA0EE6E5699"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "898FE463-291B-4C89-BEC5-8B99EA18CF23"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C9940B4-672B-4D82-B904-80A3FC1DD4C2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11ADEB65-9803-4036-AAB4-B85E430B626D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD14F17B-FDC3-4B1B-9901-E40B783E77C6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8FD2424-599C-4137-9BB0-378F34B7AB3C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6037264-BF88-4BCA-9F5F-B5D30587D9A8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BABB84B3-C5BC-4AE9-AB6E-BA4BAF9FBECB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "87ECCB82-B880-412D-A635-CA6F0B035F2B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "424743C4-CE74-4A02-835A-023C9DA0CFAC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "14EA48BF-BD65-43B2-8DC1-D97F75AD6FE5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B86E317F-12BF-42F6-879B-88A85F7E3F81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4C68227-8928-41C4-A6B8-CD142C018AB6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "38E60ED4-9FB7-481E-915B-B7576566E0BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "194A4BD4-0DDF-49E5-AA89-40A5BFB71933"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72FF9732-40D8-4C12-8259-BAA16FAB5A56"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_compute_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65B3644E-74B5-41BB-BA43-F3E588D152CE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c_compute_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "75F10C87-25C4-40A5-9B7E-904C2258CB3C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_gen_2_compute_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC68355A-3202-4317-9767-26AFDD321789"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c_gen_2_compute_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF331899-4AA1-4D55-B494-4FA47BB97AE5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D56B0CD3-138D-4197-84D5-2887C8FA40D2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_845_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E289B26-AF53-442A-9740-2F44D1F59DA5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF26AC15-F805-4FEB-9CFC-BD530FA114F6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "17A6D87A-544D-4B8E-884A-0117C499DD8D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C9F4285-1F09-40CD-B1AA-84B406FD6A71"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8623DD44-DFDD-442D-9789-11A527A450A4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22303AD4-779C-45A3-8F33-3864C45E4328"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EC440D-D420-4477-8F14-427245B80631"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "41446A77-6EF3-4570-BAD2-4C761A2C4E7F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "448C401B-EF07-4385-A7B4-123D7808F64F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22A78236-5965-4F65-9001-3FE7FF6D27E8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "414C5C1D-A5DA-47C7-B6C9-3564DD4DD911"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "01CBD543-635C-4C57-87B7-55DD3BA3C1A2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A7272B6-AADB-4CCD-B041-66170C313C76"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-ad_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9AEC3A05-8F33-4028-B7A8-9EBA236FDA9E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-ad:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6D997EED-E10B-446E-8B51-5D3C611E0F62"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-ad_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A27DE47-C6D7-4E24-9041-08D8444DDAD7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-ad:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1EBDF16D-8B58-4031-9C51-424D155336F5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-aa_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "039AEC8D-9372-4737-B846-CBF1F23ADCAA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-aa:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4306FDC5-6F33-4462-B5B0-27125DFD9F5A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-ac_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "073ED3B4-6ADE-4E7F-A797-523DA85AF09C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-ac:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "156A1CD6-2827-4D0C-B8F4-FB0C7774CD75"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-ac_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B28A559B-EA1A-408C-9C92-8CF8A62397CE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-ac:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F22559E6-CB6A-48BD-8E30-7B4E2CA7B7A6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-aa_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "00CB649A-DA70-4713-98B0-883CC404E5DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-aa:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3F8F9C8A-6E84-40C9-A0B9-21AAF60E43E7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8280xp-ab_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "19CDBCF0-01C7-4D9D-A896-283C3B21512B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8280xp-ab:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "79D59603-1A41-4CE3-A5C3-5A2EBD1BA1A2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB6053F0-5E34-458A-B084-078E4D4F4021"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF9740EB-F82E-42EA-993E-A393B05CC6BB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "022A5532-03F7-4FB8-BA0D-4221178C9486"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_4g_modem_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3C8F12FE-0057-4A13-9A7F-D12C114ECEF9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_4g_modem:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1271B0C7-2D91-4129-9B58-E6689DD68C39"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2BA4BA00-C8D1-4DAC-8030-CB5EEC7D4591"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EDC270A7-205C-41EB-A2E5-2A381A16BFBB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E1753FC-F3CD-4B50-886D-8E16D9301A84"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3E20681-4FC4-46E2-AF77-BCF03BC8E77E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6E685A5C-870C-41E9-91AA-7AA7535C4D85"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_400_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8F52FE7-2C9C-4908-A578-2230ED6A1505"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4D6C6B2-36DC-4D0D-AFF8-2108A090A78D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28FEB3B1-F641-436D-AC4F-3304C37167C4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin",
- "source": "product-security@qualcomm.com"
+ "source": "product-security@qualcomm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28588.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28588.json
index ff7ec209112..04dfbd3be2a 100644
--- a/CVE-2023/CVE-2023-285xx/CVE-2023-28588.json
+++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28588.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-28588",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-12-05T03:15:10.103",
- "lastModified": "2023-12-05T13:51:04.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:00:54.277",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
@@ -38,10 +58,5806 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FEDA6CA-A0FD-4A72-B856-C8E65AC86902"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8D29295A-7183-46BE-B4EE-F891D1C17ED9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDCB8499-A096-4633-8506-63C0A227A958"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:apq8064au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BEE2C7C3-E928-4466-B537-0D1826E2223C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2C8807E9-5972-47E7-8B39-2E4D68C7B79E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:msm8108:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "57963412-14B9-4C0D-AA0D-6928445DB808"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:msm8209_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29F64FA7-5EA1-4C91-B409-4A0E966FBD26"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1FBCA5AB-07E4-404E-A278-28F6004D2126"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:msm8608_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99AE9AEA-4D9F-4879-85F7-405279EFE5ED"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:msm8608:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDED3AA7-576C-4437-A466-D627698F4242"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B0F8ED6-EAE7-44EA-A8C6-F5AD408261F0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "886CF046-E1D9-4FD4-AC02-EAB61C3F70FD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "059486E9-3F99-4C65-A763-470564EDAF2C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "966CDA56-809F-4FF4-909D-0DD92F44CF67"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C90747B4-2CC0-4816-A994-58E00F5ADA05"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "00FE294D-4BE0-4436-9273-507E760884EC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "424CB795-58E5-43A4-A2EC-C563D93C5E72"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93ED74CE-6BF2-4983-8780-07D5336745B3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11405993-5903-4716-B452-370281034B42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "214A053F-D80C-4AD9-B4F1-83384095A3F3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "74EBA77E-69A5-4145-9BEC-CD39BA132309"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "163FE96E-DF5B-4B67-8EDE-44A5B9A8492D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FBB16DC4-CDC9-4936-9C6A-0ED8E1F6D056"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F466A5BD-1912-4811-9A93-81555F101D46"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0F92914E-16F6-4A25-9FEF-FB7CB3377132"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "02BA009F-24E1-4953-BA95-2A5BC1CDBDBB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76E03AE9-2485-449B-BCFD-3E452BB01FC6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFCB9F22-57F2-4327-95B9-B2342A02E45E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6DA2C3E1-E285-4CAD-9FA3-813C8EC436F6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F68F9B33-6BA5-46E1-A370-547CDA626985"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2D13E375-0562-4263-8452-53E117F14E83"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_205_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8F2B255-04B5-4982-8018-F43EDD4F7912"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_205_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D4DE45CB-E697-489D-BFCA-1BBA48FF0846"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_215_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E92DB42-A805-4280-A8F4-F6A7489094F8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_215_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4A8778EB-BCE0-4099-BDC8-667903F1446E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5AEA324C-69CE-4AAC-91D6-6FAAE1B3FA77"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A7B5F5CD-CE26-4C93-9FED-F783947DBDA6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F357160-9EF0-4150-893B-746289C071AD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc5_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D3429F7D-C5C7-488E-8E32-518838C51621"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:robotics_rb3_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "85FE8AF5-3747-40D0-9DE3-5A77E05251C6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:robotics_rb3_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB7865B5-FAD2-4FC3-B708-0EE4AA4E4EB1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCA73E75-F339-49BA-B1F6-619E4630DE92"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:robotics_rb5_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5DA6E940-1059-4EA2-8225-0F754FE9F50F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A558A868-1B67-48D2-8A94-FDEA7126FAE7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7964A762-467B-47D7-865F-30D48A0AE47C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "589C1001-E9F6-41A6-BCC8-A94A3C97F2E6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "33D393A6-4586-4416-86EB-F9D86DC3DED8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9043720-6B49-4305-BB4F-C88CCB6D89E9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd626:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FC8F19D3-F322-4CDC-83C5-A9F7F1777DAD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3991C516-4FBE-43D8-835F-413FE45BF73E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9CF5EBB-B25A-4A76-B522-951F108263CC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B8DA94C-23A0-4C99-9F05-144B9B5224B3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "39E10E22-E7CC-41D6-80F3-030083F45645"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1497D052-884E-496B-BEF8-6904A25125ED"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "589F4888-28F6-4ECA-860E-8054C2A8C419"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC4DA7EA-DB81-4C71-A875-2612D8D7D726"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "48F26F64-98D4-420A-8918-E5E56ABA1D47"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFA7BB42-305C-451F-92D8-0718DF68A012"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2B93301-AFE8-409B-A8C8-6754BE5A0C14"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B185412C-177F-48E2-87F9-1269E0FB8E31"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FACA2BF1-85D3-447F-A08D-B90330A22550"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2ABA18D-82C1-4366-B1D7-DED42DD3D5C5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:smart_audio_200_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE9BAA26-7377-4D96-965C-1CD54FD487B1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:smart_audio_200_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "306C7C27-1363-4FF6-AC71-BB8DB908D058"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "57B0086F-5F2C-4F89-AC53-D8429D6506CD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:smart_audio_400_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB8145C8-D978-4047-9203-602E854E7290"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:smart_display_200_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C23C4E41-66D1-41A5-8814-0F436902E9E8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:smart_display_200_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "40B2A51B-661C-45B3-AC29-BFF7C0636ADE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_208_processor_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0CC78837-E44B-4D03-A9B1-C3494D823207"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_208_processor:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DF94E560-681D-48E7-9429-9B4BDB89393B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_210_processor_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2C8490C5-0F0C-4AC6-A80F-06EF08E8C39E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_210_processor:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "680B7C89-F3C0-49DA-A73E-CCDCF0A71CF0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_212_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70E745D7-3E43-42B1-9CBE-CA53846D0660"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_212_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "13DA9023-07FE-46B5-9F3B-D6A2C5AED241"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2CCBF666-CB4E-44E1-9676-6891EDC73578"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C767AB6A-1A8C-406C-A600-96A816F44E2F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_425_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "58E5A10C-4B4C-48F7-9973-999726108CAB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_425_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E657C793-12DB-4FCB-91C9-11DB09CA6E12"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "487D6D28-F007-4726-AB69-F68B1FF4CA3E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB8FE3BF-8A02-4928-BA5F-BF2457D2C8CF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_439_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "60D19880-121E-43DD-98C5-502DEF7B51A2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_439_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CB7F9CDC-16EE-405B-AFC8-A691ECAE864E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "390D7CAF-6C0B-4438-AA7D-AEEE127F4D3C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_460_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5BB1FC5E-CF6F-4E54-B78D-C01AFD034903"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA3F11F3-C9F4-460D-BD77-1BFBCC1F0592"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "25673A10-D99C-4F67-BDA7-9C2E4A70EF9C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50906EF2-01F7-4E97-9F49-F892DF41CB29"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B23A89FF-9C94-40C6-B9B7-3E8354777916"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_625_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B6647DA1-A755-43DF-943B-E724F83A2216"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_625_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4A0D9023-3BAD-4C7F-89B8-B79808071E26"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_626_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2CC25002-D6FA-49B3-A1B7-DC89CCC1D4FE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_626_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "12A226AA-88BE-488B-816A-A29E52190B4F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_630_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "531A9325-790A-4D7E-BFF2-EB1808C719D7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_630_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E1AACB4E-70A7-43ED-953D-911D2450C946"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_632_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C96DA9DC-A75A-4E73-B51C-4AA059DB81C5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_632_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8323F3F2-010E-48E5-BFFF-A9896133D102"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_636_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2C558A35-E8E3-43CD-BAC5-C665875D3E60"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_636_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F23BF59-9FB7-49D6-846D-52263747E69F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "873CD3BE-2098-4328-B350-A14453C44F1D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_660_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE294B26-BBD0-455F-82B0-4605987B7DDC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "37DF4D73-3ACC-41B3-8CA4-20DAECE6BFB7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_662_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE08D23A-2D0D-4472-8847-27B955F55165"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_665_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9151A7D-4A02-4EDD-830E-3408BBB2B0C3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_665_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "73D551AC-1008-444B-8A69-CF8CE60942FF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_670_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C9871C72-4B99-43E5-B389-EB26996B08DD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_670_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "586E725A-B3F6-4C4D-AE46-0D76A0C0D91E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_675_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ABF96A66-FECF-4D2F-94C5-7BFC746789E5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_675_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28638583-F98D-4B88-AF50-A10642D6A105"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_678_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E1B3C6D8-F06D-48DE-9127-0E574578E501"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_678_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A933F383-717C-4D7B-836A-76042F55488F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8D0ED00F-1345-43AD-83C6-E979890B84AB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92C28019-B57D-4487-B551-F7B53395C6E5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C174F07D-0E33-43FD-9BAD-6C6D8B51B6A6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47311B68-A07F-448B-99D5-9C92C8127A81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A930E317-7F22-4605-A85F-144921EEBA0C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BAF50FDA-47FA-491B-BEAE-76CC38C18F52"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A9A2DA11-5E4E-4E36-923C-A2D3CC2F2751"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE7DFAD4-1D21-4A3A-9E8C-10F00AD7C403"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_710_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1FEAB1AE-53FE-4641-A2BB-4E1449A76E8C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_710_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3E92D896-80E5-47C6-A752-F19F1CB8005D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E6B6B409-33F8-49CA-9A09-3AA97DCBCE54"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_720g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1F34AF35-8A0B-4B90-8AE6-EC961B7FEC4B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BAE7612E-5C12-467E-95EC-90D0A984E086"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_730_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D76005A3-22FC-45C1-A01A-8640F030E6A9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_730g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E454506E-21BE-4BC9-91B9-21DC2AEA63E3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_730g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7D06996C-0832-4406-9581-1327345E95B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_732g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A0E3DAEC-1C6C-41D4-867D-A246C51A7F08"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_732g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B4E25E7B-7391-479A-AE10-E593ADF7A5B1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A96C773B-B228-4A39-8CAE-AEA0EE6E5699"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "898FE463-291B-4C89-BEC5-8B99EA18CF23"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C9940B4-672B-4D82-B904-80A3FC1DD4C2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11ADEB65-9803-4036-AAB4-B85E430B626D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD14F17B-FDC3-4B1B-9901-E40B783E77C6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8FD2424-599C-4137-9BB0-378F34B7AB3C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6037264-BF88-4BCA-9F5F-B5D30587D9A8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BABB84B3-C5BC-4AE9-AB6E-BA4BAF9FBECB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "87ECCB82-B880-412D-A635-CA6F0B035F2B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "424743C4-CE74-4A02-835A-023C9DA0CFAC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "14EA48BF-BD65-43B2-8DC1-D97F75AD6FE5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B86E317F-12BF-42F6-879B-88A85F7E3F81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4C68227-8928-41C4-A6B8-CD142C018AB6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "38E60ED4-9FB7-481E-915B-B7576566E0BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "194A4BD4-0DDF-49E5-AA89-40A5BFB71933"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72FF9732-40D8-4C12-8259-BAA16FAB5A56"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_automotive_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22B3AB46-81F4-4C45-AF66-C8B36A175685"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_automotive_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A8198E0-C95A-4433-9EC0-F544CAA90251"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "81FC1C9D-D494-4426-93FF-A774D68554D7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_835_mobile_pc_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B4837E0-EFF7-4546-918C-03551E03F6BD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D56B0CD3-138D-4197-84D5-2887C8FA40D2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_845_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E289B26-AF53-442A-9740-2F44D1F59DA5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF26AC15-F805-4FEB-9CFC-BD530FA114F6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "17A6D87A-544D-4B8E-884A-0117C499DD8D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C9F4285-1F09-40CD-B1AA-84B406FD6A71"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8623DD44-DFDD-442D-9789-11A527A450A4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22303AD4-779C-45A3-8F33-3864C45E4328"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EC440D-D420-4477-8F14-427245B80631"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "41446A77-6EF3-4570-BAD2-4C761A2C4E7F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "448C401B-EF07-4385-A7B4-123D7808F64F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22A78236-5965-4F65-9001-3FE7FF6D27E8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "414C5C1D-A5DA-47C7-B6C9-3564DD4DD911"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "01CBD543-635C-4C57-87B7-55DD3BA3C1A2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A7272B6-AADB-4CCD-B041-66170C313C76"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB6053F0-5E34-458A-B084-078E4D4F4021"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69D1567F-D669-4415-9A08-110221EFA6BA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x50_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EF808C56-AD46-4351-9A46-6A2B6AAAB5BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1E1B7FD-39CD-42AB-A113-2AFB25B5F85B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C93EECE3-7A8A-4B58-A674-134040CE43FE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF9740EB-F82E-42EA-993E-A393B05CC6BB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "022A5532-03F7-4FB8-BA0D-4221178C9486"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2BA4BA00-C8D1-4DAC-8030-CB5EEC7D4591"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EDC270A7-205C-41EB-A2E5-2A381A16BFBB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CF839E24-6542-4C5D-A1B7-FD3BA00683CB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr1120:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E9F12284-93E0-482D-9D35-EB38BA7D6C6D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E1753FC-F3CD-4B50-886D-8E16D9301A84"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3E20681-4FC4-46E2-AF77-BCF03BC8E77E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_100_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "42F94655-7876-42AF-828E-E1B6DC671F46"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_100_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "08AB0C49-042F-4C18-8122-54E0994300F3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_200_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9804EF5F-92E2-42F8-A714-42A091E16CC7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_200_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89BEAC30-92AA-4733-B45F-E4E5127DD5A9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6E685A5C-870C-41E9-91AA-7AA7535C4D85"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_400_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8F52FE7-2C9C-4908-A578-2230ED6A1505"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2503805B-B2A6-4AEE-8AB1-2B8A040702BD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D3AD370C-2ED0-43CF-83D9-50DC92A01CA5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DAFD64E7-3F13-4DCA-8C46-6E8FE0C6F798"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "044A14FB-64F6-4200-AC85-8DC91C31BD16"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9590EF1F-E821-4525-943B-4A315ACAEFFC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7A7D32B3-325E-4B1F-8649-3D0071396BBA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0F66A898-3C7A-4D44-86BD-89129F04E654"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B612B044-C7D1-4662-AB2A-5400E34A3CA7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin",
- "source": "product-security@qualcomm.com"
+ "source": "product-security@qualcomm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28604.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28604.json
new file mode 100644
index 00000000000..0c0fee05e81
--- /dev/null
+++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28604.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-28604",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T17:15:07.817",
+ "lastModified": "2023-12-12T17:22:30.567",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The fluid_components (aka Fluid Components) extension before 3.5.0 for TYPO3 allows XSS via a component argument parameter, for certain {content} use cases that may be edge cases."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/sitegeist/fluid-components/blob/master/Documentation/XssIssue.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://typo3.org/security/advisory/typo3-ext-sa-2023-003",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31048.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31048.json
new file mode 100644
index 00000000000..8414ab85d5a
--- /dev/null
+++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31048.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-31048",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T17:15:07.867",
+ "lastModified": "2023-12-12T17:22:30.567",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The OPC UA .NET Standard Reference Server before 1.4.371.86. places sensitive information into an error message that may be seen remotely."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-31048.pdf",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/OPCFoundation/UA-.NETStandard/releases",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/OPCFoundation/UA-.NETStandard/releases/tag/1.4.371.86",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-334xx/CVE-2023-33411.json b/CVE-2023/CVE-2023-334xx/CVE-2023-33411.json
index 5923d183bf4..a4db587a00d 100644
--- a/CVE-2023/CVE-2023-334xx/CVE-2023-33411.json
+++ b/CVE-2023/CVE-2023-334xx/CVE-2023-33411.json
@@ -2,23 +2,10206 @@
"id": "CVE-2023-33411",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T18:15:07.393",
- "lastModified": "2023-12-07T18:30:55.033",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T18:53:04.930",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A web server in the Intelligent Platform Management Interface (IPMI) baseboard management controller (BMC) implementation on Supermicro X11 and M11 based devices, with firmware versions up to 3.17.02, allows remote unauthenticated users to perform directory traversal, potentially disclosing sensitive information."
+ },
+ {
+ "lang": "es",
+ "value": "Un servidor web en la implementaci\u00f3n de Baseboard Management Controller (BMC) de Intelligent Platform Management Interface (IPMI) en dispositivos basados en Supermicro X11 y M11, con versiones de firmware hasta 3.17.02, permite a usuarios remotos no autenticados realizar recorridos de directorio, revelando potencialmente informaci\u00f3n confidencial."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:m11sdv-4c-ln4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "BB4C5A73-CF7A-4891-90A0-ECC1BEEEC8F4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:m11sdv-4c-ln4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA419264-0203-4851-83E2-6C8D9EC10CC4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:m11sdv-4ct-ln4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "2B119A07-8996-4EF8-9BCA-6F0EFC78ABA9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:m11sdv-4ct-ln4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47CE6672-50D3-4F34-86A9-75B81CDF2A9F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:m11sdv-8c-ln4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "A61610F5-C653-4731-8B42-8C70BDF7505E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:m11sdv-8c-ln4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FC8BBC2-9D1B-4242-A850-48BA13F3BEC3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:m11sdv-8ct-ln4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "1A7BE31C-1C28-4937-BB45-46C978ADC335"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:m11sdv-8ct-ln4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "704A622A-9144-4673-8DF2-651B7C70450B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:m11sdv-8c\\+-ln4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "03497EA2-5051-4B65-A851-C95DD0C45C84"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:m11sdv-8c\\+-ln4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C183B42C-0B42-4C80-9FB2-0191B06A754B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:c9x299-pg_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "F8865673-289A-4E7F-8DA5-C707957AE5D8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:c9x299-pg:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "43A67415-C05D-46F8-8C82-381A4763610C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:c9x299-pg300_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "CA8F7797-378F-4BB0-A172-D79E01891F5B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:c9x299-pg300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F049DED7-6A11-4B35-9318-7CBF9A4669DD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:c9x299-pg300f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "62CE5298-8933-42C7-9538-0CF7152E086E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:c9x299-pg300f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BBB5FD13-BCEB-4E0C-999A-B8DC68073B9E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:c9x299-pgf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "FCDC20AD-D292-472D-A725-C99D90D696D7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:c9x299-pgf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0670C747-49E6-4358-9989-CBF08D20BDD1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:c9x299-pgf-l_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "9C918A3A-2BCD-4F62-9EBA-13C8F3C016F4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:c9x299-pgf-l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29A2FC6A-8873-4B9F-A1B4-B88429A135F7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:c9x299-rpgf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "861476F5-E684-41AE-9E33-62D22A18B064"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:c9x299-rpgf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1AC82579-210A-40F5-A12E-2829FF0B2DA3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:c9x299-rpgf-l_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "6E3B530C-3664-4EE6-B15F-4031E91893C2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:c9x299-rpgf-l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "595457C2-0C73-457F-B571-B9B694062D7E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:b13dee_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "97C2F1CB-98A2-487C-8E9D-75CCF36B1C5A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:b13dee:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3411564B-FCE5-4819-B226-65F7B3152E32"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:b13det_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "2FBB7068-B11B-43FD-8866-71F3484248EE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:b13det:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67D98A72-B2DE-40C8-9491-B7543677A266"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:b13see-cpu-25g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "DD8AAC7B-19F3-43D4-89AD-A5F717374067"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:b13see-cpu-25g:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1B07E94-29D2-4DAA-9B34-3573FEE22C7B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:b13seg_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "4B0D0D78-832E-41E6-84B8-C651C94749EB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:b13seg:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B6F157CA-D9A4-4EFA-8C0E-D644E9E3C8A2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13dsg-o-cpu_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "6BB12538-3CEC-4A7C-8E9A-DE7E5079E426"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13dsg-o-cpu:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DA579368-7624-46E8-93A4-596A18538BD2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13dsg-o-cpu-d_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "6552B70F-94CA-4AEC-9519-D2952A0B3B3F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13dsg-o-cpu-d:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E0F442E-B787-43EA-8FC7-078935708514"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13dsg-om_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "66D2261E-3CFE-40A8-8C80-DE4B0F70CA33"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13dsg-om:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B93C26E1-EC4A-4B55-BC6C-4DBB3B29F548"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13dsh_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B066F428-4D87-4233-8C49-475ACEE4A861"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13dsh:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89B92EB3-1B95-4095-BBEA-B1DBDB3B0FA2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13sae-mf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B275D084-1081-4891-B8A4-CFEDA687593C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13sae-mf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F556ECED-E349-4D22-B5E6-FC7D5E70BEAF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13sra-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "3B22FBD4-BA6A-418D-A835-93B61F08B085"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13sra-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "87E5769F-2994-4D71-BA3F-F84600F888A2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13sra-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "0B25B157-9AB1-4FBA-8500-01AC35A91911"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13sra-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A6CDD62-FD70-4219-A8B3-3C0F01C3F1C1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13srd-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "87BA83AC-0BE8-4E0A-9A55-6B7E976153BE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13srd-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "675A5F85-E7EF-40B4-A7B0-1C4FA83E20F6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13ssf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "C5522D20-411D-4673-AEFF-91F872050CCF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13ssf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "63215A82-9A56-4901-B5AE-90633D64E1C1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13ssh_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "65CFBF7E-4450-495A-8E29-BB814EE5474E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13ssh:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "10D2DCA1-183A-48FE-8F59-B1A67B0576DE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13ssl-n_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "772C085F-F428-48EE-B559-B77B891BBCB1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13ssl-n:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "364216C0-0D65-40A9-B35B-36B1A9228A56"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13ssl-nt_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "1A37D71E-3B24-4890-975F-B1807ED531A7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13ssl-nt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F06F7E1B-6235-4B48-88AA-B9833AE75862"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13sst-g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "098BEC3C-6859-454A-B466-CCD975C6EE12"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13sst-g:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "005B9DC1-4115-4773-8F45-F4FB555A03D1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13sst-gc_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "AF2A14DE-1F9F-4D01-9CB4-977C8D71597A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13sst-gc:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C340BFE-2FB0-4BF6-A2B2-B8526DBB1D63"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13ssw_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "917A23DF-FCEF-4FB6-ACDD-8077A2091816"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13ssw:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A611C4A-57C2-48A2-B3E8-4AC46242CD31"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13svw-n_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "BC575B82-D63B-4FBE-A18D-BA9A7615F66E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13svw-n:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB3B6BEB-65D4-4D08-A2A0-5B91C5C93757"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h13svw-nt_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "50B780CA-71F0-479F-B1C3-4573129883E7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h13svw-nt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F0AA1B7-A15E-4570-A47A-4734DAAFC9F0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13dai-t_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "3450B80D-F902-4A9B-AC94-474C6A1BEA06"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13dai-t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "75EA52CF-A1A2-4A09-849A-423F6E47A485"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13ddw-a_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "4FAFFA34-4335-4A0E-BEAE-A9502CD47265"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13ddw-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "558BAD24-8C02-4A7C-B10F-48059C810579"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13deg-oa_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "571760F1-A792-4319-9592-19368FF462FE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13deg-oa:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5FAD54D8-480C-4BBA-8A17-5557BDA7CED0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13deg-oad_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B4903E9B-8C41-42C2-95FB-8171EA6D6C3F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13deg-oad:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D661D4FC-874B-4020-B03B-A7DC3B82B0E2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13deg-pvc_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "6C305075-2344-408D-A569-7457434C8A9A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13deg-pvc:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD036B36-43BA-451C-B371-A04C41FBEB65"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13deg-qt_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "606D0988-D3C0-47CE-A8F4-5440243416AE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13deg-qt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0EF5517B-B6C5-47CA-929F-D4B95827A902"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13deh_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "2D119D5D-AC6F-4606-9075-807201258470"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13deh:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "852917B3-AFF7-4465-873C-5D5A10F7966D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13dei_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "E6E28F78-6BD7-4E2B-8BA3-2637FEB09DBD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13dei:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A18D05BE-FE30-4041-A250-1F26825C591C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13dei-t_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "9AB27667-74A7-493E-8B98-4B1836779245"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13dei-t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "841C9D0B-F0AF-411F-BA06-2432BA24B275"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13dem_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "1AF9BD95-9BA9-4949-A7D5-028BE528E81F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13dem:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E3A34C5B-89B4-4DC2-A8CE-9257B450D79E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13det-b_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "76182A30-365B-4183-A3D6-24B43A1DD5A1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13det-b:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EBFC9589-DF31-4D9C-B50E-11503F99C618"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13dgu_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "00D7B8E2-ECC7-433C-9BF8-30DB2DD9C904"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13dgu:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70E0611D-F0DA-44DB-8D43-C9249B6106DE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13dsf-a_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "979A6750-1575-4E5F-B440-620D8623F0A8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13dsf-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE647392-5307-4D6B-BAC0-4533BC4A4801"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13qeh\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "FAB88534-4CDD-463E-8004-688F16BA3C03"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13qeh\\+:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6560D7C5-8D62-4634-8E2C-CB293BCE3126"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13sae_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "7BE8C5BC-7C49-4139-9D21-78463D7DC775"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13sae:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F36733DC-9633-41C9-BEB6-AA1630FCB9DE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13sae-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "45F2F46A-C272-4187-BC92-248F7BEE5DCB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13sae-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B6AE36E6-C235-4524-A5AA-C26AD5B8AEC7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13san-c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "E9FE5298-F64E-4333-A870-C9D916562250"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13san-c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "74BCA069-8DFA-4441-AA2E-2861C01A4A6E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13san-c-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "1460E0F4-1786-4C80-AAD3-0DC3229B0863"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13san-c-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B2C7E3F-7E79-409C-AA7B-29361EB96516"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13san-e_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "3B35449E-A228-46C0-8FB4-AC1052ADDB7C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13san-e:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3E8F060-82A0-49AF-AC11-69ED96403CA3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13san-e-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "0554C8B7-A7C4-4850-9C2E-3DCAB3530AD0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13san-e-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9551D604-528B-4942-B207-37E851F64690"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13san-h_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "00FC5F1A-ACB3-4F63-B276-B92EAE871ACC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13san-h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "87F176BE-5099-49B2-B658-7A8F2BFF793E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13san-h-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "F7BF68EB-AFC5-49C7-BF62-416E7EFD638D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13san-h-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3378D8AA-EB40-4F73-83CD-765FA4A4DC6D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13san-l_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "1729755B-724B-4D01-B858-60216C580CD6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13san-l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "96CBF59E-7865-41A5-8952-512FD13F1CD1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13san-l-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "2390C99E-41A6-4A56-B89E-15041AEEF467"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13san-l-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66765BAD-8F07-492C-8740-25FBC4DB0DEB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13saq_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "DAA5324E-0383-4022-9E85-36DEF93C3CC4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13saq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4B8AD410-AF0F-42E0-B60A-71BCBB6BC3BF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13sav-lvds_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "764B379D-46A1-49FA-9BB7-C024F3F165CC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13sav-lvds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7C2F5EDC-CFD5-41F5-9EAF-FB5CB6E9764F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13sav-ps_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "00ED42A1-6577-48D3-ABF0-B3ECA79023F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13sav-ps:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE3C2846-5816-4773-B73D-4B36A6B24542"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13saz-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "0C33B135-B212-4F75-A0B5-615CB437B782"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13saz-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A97110CA-8623-4EF4-90DE-9356D5E9311F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13saz-q_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "3B994482-2AC4-40DE-92BB-81D50EC62073"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13saz-q:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "909438EF-7652-4184-9DB8-CB2E45B300A3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13sedw-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "97AA39B0-E63B-4CCE-82D2-092A075D6490"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13sedw-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46BE300F-CE76-45F4-BFBF-6CA857E593CB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13seed-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "A793DE0A-83C2-4EC1-AE60-C77F2BBDD73C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13seed-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "241D4911-2240-42CD-8F52-F7B66CBE0CEA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13seed-sf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "EAC88C3E-9A6D-43FC-AE3F-D1630D3B00EC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13seed-sf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A3C13F43-A756-4395-9FC9-CF4DF74B3393"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13sefr-a_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "4C41416B-7DC7-4CE1-B269-BAA9EE844C2E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13sefr-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "509CD460-D28B-4267-8E6D-FAC4F2332AD2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13sei-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "A8277A30-EB1D-44B0-8B86-0EB1F9FE1238"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13sei-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95E7BBBC-A310-4F66-874B-1A7A8ABA1BD4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13sei-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "6326D9F2-F77C-4EBE-9238-93CE8977F7F5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13sei-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "403DBCD1-9A34-48CF-B610-62E6369118C9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13sem-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "A4C3FE24-FCD0-4376-BF5A-58A9559EBE67"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13sem-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BBD8D5E0-0545-47AA-9A16-566D7EC2CD8C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13sem-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "42D566FE-B728-499C-99AC-197C2A8B8647"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13sem-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9825E801-7F77-479B-B8E6-751AAD67E8DE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13set-g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "65FF4FE8-BC6B-4158-9C77-E43B01C382D3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13set-g:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E19D0CC-9619-4F17-B7B8-CD94A9583682"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13set-gc_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "4BB74893-3F83-4B5D-AA17-AA773C58C2E5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13set-gc:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "625C3534-DE49-4833-AC7D-4B12A3B7C4D3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13sew-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "3445CA19-640D-4493-A0C2-A36AC853D2DE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13sew-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "996E89B5-0F5D-49F1-8F1A-CFDD698B6709"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13sew-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "DF6C8519-1FFD-4BD8-9FB5-BD8124B1DAA6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13sew-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A880465-2345-4807-832A-C277A3B12224"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13sra-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B40FE641-15F4-4BCB-9438-9D87504C36B5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13sra-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCE31EC0-1E3C-404B-8202-451F7708DB85"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13srn-e_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "93700262-0646-45A4-8D10-46F9F7167D78"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13srn-e:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F6E7176-6F39-406C-BAD4-E244CA46E8CD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13srn-e-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "79E512EC-73A2-499F-8EF3-786DC0E2CAB7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13srn-e-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E95DFD86-177C-405C-B738-08A22770BFFD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13srn-h_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "EA02E576-E217-4971-8E5F-A970C877F35D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13srn-h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "90A4FB92-627A-44BC-8ADC-BF1AC00DA889"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13srn-h-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "F7DCB5B5-5C83-4C67-946B-71C705418FFC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13srn-h-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF9C1975-29A8-44D9-998A-01770D5FE776"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x13swa-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "07524755-F1AC-4185-9494-91C1361E3000"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x13swa-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2EA1F0A-9282-4BBA-8752-FE0E14B5A9F2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:b12dpe-6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "11D3CA26-0BB8-49E6-B2F7-0ABFD1036220"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:b12dpe-6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE507AF6-C51D-41F9-B7D3-97F5E2C92EF9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:b12dpt-6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "60436593-5D82-4956-AE33-31BBB0F03B54"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:b12dpt-6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D73CE868-F4FF-4645-AD2C-5CC8064A1632"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:b12spe-cpu-25g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "EAE6D577-66CB-48FD-8B07-8ADCE788BAB2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:b12spe-cpu-25g:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9D8065D-2076-4DFA-9156-486EC6DC3521"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12dgo-6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "5021B9F2-BE6F-4EC5-8820-CD7B79DB44F3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12dgo-6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6BE72168-E2BE-4E5D-99A3-E5874FB027E3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12dgq-nt6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "039BEF08-D29A-441A-83F9-3918895446FF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12dgq-nt6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C9BF14BD-5E65-4C3C-ABD4-E7D26AF05D25"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12dsg-o-cpu_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "22789C3E-DCF9-491F-9F3D-FCEFB9700655"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12dsg-o-cpu:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "55A8A11C-8FE3-4789-A517-F1E14FC2710B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12dsg-q-cpu6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "A7A1BB17-DCB8-492F-B560-30BC66E3ED6D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12dsg-q-cpu6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "44FE8EFA-41DD-44FC-9786-3AFC6AB828D1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12dsi-n6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "D666C96E-79E9-4932-AA62-22B856379AD7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12dsi-n6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9892D863-F361-4511-BB61-61398CB8360F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12dsi-nt6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "CC212365-8347-4152-B789-1919B7766469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12dsi-nt6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A9E11E3D-B003-489B-BCF2-76CEB30EB6E4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12dst-b_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "473D1854-189A-4644-B3BA-69F812522F58"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12dst-b:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8DF3E668-0CF8-404E-8A08-EB2CCB1D2489"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12dsu-in_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B2023BD6-2172-4F45-8D14-BF64FA9E345B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12dsu-in:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F019FB2C-63BC-417A-81E1-E852C052007C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12dsu-inr_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "5ED2FBFD-5B1F-4CC7-8B5E-6C65FD5A9E7D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12dsu-inr:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2DB5BC9-8633-4148-9EF9-D9564B184722"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12ssff-an6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "A04CD567-D448-4C4A-AC98-E908726CD7D7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12ssff-an6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8CDF0E3C-8205-4179-B0BC-CDC00BE5C3D4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12ssfr-an6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "999F91F7-3C2B-4807-93BF-7D4ADB5A7C16"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12ssfr-an6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA767312-A7E3-4BE5-AF2F-D2B69756160F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12ssg-an6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "CB34D33A-1361-4BAB-8603-31E1C0B0B8D2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12ssg-an6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD0EE294-07EE-4ACD-A189-2F48667BD901"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12ssg-anp6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "72FF16D1-A625-4A0D-8541-0C51DBDB9A64"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12ssg-anp6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1558880B-8A49-4212-AEA9-A525FB454E8D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12ssl-c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B09A2193-C82B-4F5F-B058-ACF5BF590F6A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12ssl-c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C78D0B4-958A-4874-8540-9C622BEC5444"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12ssl-ct_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "414D34DD-39B3-43E0-876F-B297897F3F29"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12ssl-ct:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50943BA5-0DAC-4246-9287-CA9DD9D05F9F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12ssl-i_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "AECDD073-7DE1-48A3-ABD6-5635EABD7097"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12ssl-i:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0B9CEA83-ADAF-4659-88E9-D0056EB699BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12ssl-nt_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "165ED5F8-50AB-468B-B07D-85A7E8B26EA5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12ssl-nt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7D1F99BB-1F02-4CA1-8C5A-A69F4674D4B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12sst-ps_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B0736CC8-B905-403B-8BFD-141BF8613752"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12sst-ps:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF330665-9B9B-4B0C-92C8-427D4B7A77AE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12ssw-an6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "26F41B3C-3B97-4A1E-8AD5-21FBEC32FB18"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12ssw-an6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CCBFB445-EBAF-4A9B-A2E7-9B88CF4A2EB5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12ssw-in_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "5127B859-8891-496B-BD31-112D1EE080B3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12ssw-in:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FED457FD-AB0F-4829-9C4F-C00F9127E293"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12ssw-inl_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "AB6A08EB-A53B-44BE-ADF2-C59ADD078EC5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12ssw-inl:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "30940045-B6F5-4AB8-A761-234A9049D48D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12ssw-inr_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "2F46E654-5707-4D7E-A7E1-B0BE9CD73623"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12ssw-inr:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C80067D5-61BA-48ED-B17C-5EAB04AB0CB5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12ssw-nt_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "D4CF1A5E-9B2C-4BEA-A366-BC1897B2C184"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12ssw-nt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A63737C8-F51D-48B9-A926-161175424379"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12ssw-ntl_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "E1793679-E7A5-430B-8DEC-20E74E05954A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12ssw-ntl:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7B3555A1-5FFB-416D-ACDE-1458E655EE5C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:h12ssw-ntr_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "404D7E94-878E-4600-9EB4-CE17667D2911"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:h12ssw-ntr:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "34E1FE8C-4916-4BCB-BE13-FFFFD1EFC611"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dai-n6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "AAEA8DAE-D366-491D-ADB9-F4BB78C4573F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dai-n6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7CC667F4-B046-40FD-8F10-0BAD14B41430"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12ddw-a6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "2064B555-C880-4878-989A-2CC6568A76AA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12ddw-a6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2D56F5ED-B7B3-4B8D-83BC-0CB19BD8F66F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dgo-6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "C0A7FEB4-6372-42BC-8A3E-19DE64450D7F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dgo-6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "169EECF4-BA7F-47CB-80A4-848A79EB552A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dgq-r_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "95476FBE-B4F7-42FE-A060-5CD460C6443F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dgq-r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A5262CF8-A96F-4E95-A83A-663A60551A10"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dgu_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "88302A23-02AB-45D7-A3A5-BFD2691B1AF9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dgu:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DC634195-B8D1-4410-8A36-54B528F5E818"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dhm-6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "E18662F3-F773-47CB-83A4-AD0B67A66CF8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dhm-6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C586A8C-FF1B-4BF0-A8C1-C6A10C0EE16F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpd-a6m25_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "E262D39E-CAB0-49DB-9533-CD16F0D4AB1D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpd-a6m25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A3966B3-FF26-41C6-BF93-FA31E1C09A84"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpfr-an6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "F72B7AA8-BBD5-4490-9184-E9CE3DFA2E95"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpfr-an6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7D03BF5A-FFE9-45B1-8C2C-C8128BCBF3D1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpg-ar_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "EFDD3D77-9464-464B-A977-625879DA6ABC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpg-ar:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "87EA78EF-87FB-4B52-8430-0F6042D4DD03"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpg-oa6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "0D3A7A28-2F1D-4ACB-9515-27FC791465E8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpg-oa6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51770E5F-7560-4D1E-BA72-4F94CA07E477"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpg-oa6-gd2_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "CCA6DA60-4E67-4423-9F41-4A0EC3675746"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpg-oa6-gd2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D54118C8-4C75-4C95-8055-6B072D66D8D4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpg-qbt6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "5AC0E6B1-94D2-4C2F-BBFF-97B6490B696B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpg-qbt6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "923D2191-4164-4DD2-8C20-DBE60FF4B3BF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpg-qr_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "0BA33430-2D60-4139-8CE8-B0DD45C749C7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpg-qr:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "170BD2F4-5084-4134-A307-6C7AFB82E6C3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpg-qt6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "0D0E650C-AE7C-48E3-959E-11BB9FD45027"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpg-qt6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C83564AB-8D23-4352-AF0D-30B408F54DD8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpg-u6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B04F1D85-B26C-4BED-AFD8-B9B4CDAA465C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpg-u6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E445164C-B4DB-44B9-9CE2-122BC6616563"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpi-n6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "65E5E52B-2E68-4006-B10F-32000CCE419F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpi-n6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FA07B5C-1194-42A4-AF6C-3C3B7F880477"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpi-nt6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "2E1E04AF-DD68-4C7A-A73C-199F31ACB7BD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpi-nt6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A9BDD13D-5287-4536-83C7-1ED806E8AD45"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpl-i6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "999BE14F-54EA-4A0B-ADEB-9D7338D00CA3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpl-i6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6606E793-BF7E-4148-83E3-2A6DF823AC50"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpl-nt6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "9878B129-167D-4D3B-BF70-BE7B5D011EE7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpl-nt6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "80675EA0-674B-4BDF-B502-FAA90B4E07B1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpt-b6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "11148105-FDED-413A-BAD3-3CCE29267334"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpt-b6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1762A2E5-9BCD-4832-9D6F-EFF6FC09A379"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpt-pt46_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "F571415A-618B-44FE-A4C8-D183317C85DC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpt-pt46:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA40A9FF-75AC-4B47-8C4C-DE571753F0F9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpt-pt6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "4B68134A-0D7B-4C09-87F7-E973113FA867"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpt-pt6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ECEEE89C-A717-497E-AE60-FECBCC856DC0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dpu-6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "85FC2F68-71B8-44C1-9D03-6A4167E10979"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dpu-6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D5EE5C9-4E57-4C7B-A385-494AB2E45035"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12dsc-6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "8F0C7DDF-BAA5-4639-90C1-25DB26F5075C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12dsc-6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0FE3F996-E887-462F-9292-18B7DB6D45FD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12qch\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "19632406-A07D-4296-AD18-AFAA55441DDE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12qch\\+:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F2FE423-DE41-408F-BD8D-66D47FEAEBA6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sae_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B3801897-A401-4892-A4EE-FF5E3D724082"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sae:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1AAFEFE-7162-4563-8B52-FD722A929608"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sae-5_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "CEC86047-62B1-4225-8EE7-D94081CE2763"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sae-5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "317170CC-173C-441F-A949-333638B2FA55"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sca-5f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "818F20E9-05EC-4FB6-B921-091F381247AD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sca-5f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "768D9AB1-4E20-49D6-9EEB-4DE51F9288A2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sca-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "753E5810-B93A-4B6F-9C88-28FD1F259045"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sca-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F023A6FB-2560-4B88-AFD2-95804630A2F5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12scq_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "BB2C3E6A-1A6A-454C-9D04-97D3B5E44E59"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12scq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE0592CB-58A5-4CC6-BE47-BDC50F496962"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12scv-lvds_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "1512D28D-3435-4A6F-98D7-8ED74C1B8C5F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12scv-lvds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "55F9B346-4C9D-4F23-ACB3-EC5B4C3271EA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12scv-w_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "64A13C56-763C-4C6C-B39E-5D8DE5AD1669"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12scv-w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F70FEFBF-F3AB-492E-9802-A5E804C6E1F2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12scz-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "E4506A1E-68C8-4F90-8BBF-A97A135B794F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12scz-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8B6C62F1-063F-4B9D-8FFB-2A32EE5FD7F4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12scz-qf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "18CF94E3-762B-45BC-8BCA-87B48EDB9566"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12scz-qf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9EE82B1F-8994-4E4F-A515-6357A1645129"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12scz-tln4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "4036CD43-52D9-4759-8436-2C29921D0D39"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12scz-tln4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C06348E2-5AB3-4DFD-A2DF-7BD64C12ABCB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sdv-10c-sp6f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "BB766E78-6CA7-48A8-B7DD-3FF659111AB4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sdv-10c-sp6f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E61BA137-62D3-488E-842F-CE5F71A62916"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sdv-10c-spt4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "159158B7-6172-4762-8523-3E9CA651FF68"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sdv-10c-spt4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E31BC56C-BEAD-4CEA-8EA1-244074825CF1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sdv-14c-spt8f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "37E4FA14-75E2-4F18-9CF2-7954067594A8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sdv-14c-spt8f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0DF63207-0C8B-4AE4-9C58-0B3906AF56A5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sdv-16c-spt8f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "797C28CC-ECB1-473C-91FE-5B8C90F483E1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sdv-16c-spt8f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FC72465-7062-4111-AFFB-14751D981772"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sdv-20c-spt8f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "E06E7506-52CC-46BA-8A54-748954E3CE9E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sdv-20c-spt8f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4F701465-E472-400F-AA8E-A23A1636458E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sdv-4c-sp6f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "38E0B686-1605-4D34-B98D-46CE5DAB5C57"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sdv-4c-sp6f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "27886D70-CD59-451B-A22A-BDA9C216DA4E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sdv-4c-spt4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "E2E7C775-A494-454A-98B8-A467DB06FEDD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sdv-4c-spt4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED0E2C8F-D697-4108-9ED4-C6EAD305003C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sdv-4c-spt8f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "E9B1AD70-057A-489C-B8FE-974D345E26DE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sdv-4c-spt8f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "45F512E8-77D1-4DAE-8B62-CDFC3F36C30E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sdv-8c-sp6f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "FC4613BC-7233-47EF-A70A-010CB5FF1E66"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sdv-8c-sp6f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C701DCE6-0EC7-4DE5-BFA6-5ED582D13C4D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sdv-8c-spt4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "24427B55-1AC8-4020-A6F3-C57C173DFBFB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sdv-8c-spt4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4301217-8703-4D98-A7FB-F45DB4C9EA59"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sdv-8c-spt8f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "CD2B0693-E855-4143-89CD-0061040A2BF9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sdv-8c-spt8f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A88762D9-3E01-4B25-868B-173040EA440B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sdv-8ce-sp4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "43396497-7840-4BF3-B625-D1BFBE6AB60A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sdv-8ce-sp4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5FB32C1B-1A46-4976-8D71-53BFF8F1429C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spa-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "639B97B4-E339-43EA-9911-99721C406698"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spa-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4ECEAB2-4D8A-447B-A622-E8E3282C1651"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sped-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "2F18CE69-1024-4AC4-85CA-16D6FFC4CAB1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sped-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ECB324E7-F72B-41C7-9E63-4E9AE39420EC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spg-nf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "FB4DEA6C-25F6-4374-952F-5BA98386FF01"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spg-nf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22E9404C-5FFC-485D-A94E-1F7C4F68B0FB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spi-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "1DD61F91-4407-4387-AF48-4FF97538F074"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spi-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA46A96E-0E1C-4AD0-A7BE-06A65C4DD75E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spl-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "73A298C7-5BE0-43CC-817D-1C7FAE38F543"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spl-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15FE00C9-77B3-43B4-A548-9C4F0FA83ABD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spl-ln4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "1C880CF4-019A-4270-830C-A0008854FB77"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spl-ln4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D01A53FA-F307-4B49-B803-DD7E3498BD00"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spm-ln4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "2B1D297B-735F-4715-8E1D-36C2551D5CDE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spm-ln4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DEB567A1-A336-4B2E-8B35-0EE3F5B37ECD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spm-ln6tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "A06CA5D7-4D15-4F8C-BD44-8CFD10675911"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spm-ln6tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9766735D-CC06-446C-A6C9-C4A5671EA356"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spm-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "46CDD49A-4C1A-428E-B2B1-8C15F3D7DE96"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spm-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF8F8046-D474-4A41-AC0C-93C43BAFDCA5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spo-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "C41502B0-419A-4EEE-A3D0-2226297E8DE5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spo-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D374750-F0F1-4F04-B127-7497DE767B19"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spo-ntf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "1774E077-1D08-42B0-A24E-614EB4EAB7B9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spo-ntf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "77BFF598-DB0F-4696-9787-2216817F9DC5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spt-g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "BD1A08D9-3A35-44A2-9B62-04A16421E1C6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spt-g:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "414CABC0-9708-4C42-AFEE-03296D916319"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spt-gc_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "17A95DF1-0D00-4336-8685-ACE4CDEEAC20"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spt-gc:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "872EACFA-9A11-4801-9D97-7875D32F2E5E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spt-pt_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "7C5C3377-C72C-49D2-B9CA-C6CBF99375EB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spt-pt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "27DB6C75-ECB7-453F-9A1B-99A962A13E6B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spw-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "EB67B3F4-7D78-4CA8-8F7E-3BAF483CB930"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spw-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "53FA6DCE-6515-46FF-A347-B6C429003DEB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spw-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "81620B39-4A78-4F55-B4DD-D83C4AB4FF7C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spw-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "887FC02D-8065-44C9-A3B2-1FEEAF3EF56C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spz-ln4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "77487F7D-935D-423B-B434-89893474EE11"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spz-ln4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2C067EC2-DA00-4D87-8903-C99E7058710D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12spz-spln6f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "282989D0-D5D0-4A89-9706-55289395BF27"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12spz-spln6f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A450B280-D321-41D7-8B9D-B8F3C8B3B786"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12std-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "10F85E07-0BF2-4F58-8F3D-BBA7EE67AD56"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12std-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BEC355A7-ED7C-42DE-A7B5-76A21BD361EC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12ste-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "E055588E-65F9-4B15-B01F-031C74BD4A1A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12ste-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89049FC0-7786-4E8A-BF6A-56F70BCBADBC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sth-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "F7B188DD-1C6B-4A5F-9E2B-61435693218E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sth-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E76F1D7E-DC1F-45E2-BF79-8A33D5670DF1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sth-ln4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "E391C4E8-CAE8-41F9-8831-559E4DD66AF1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sth-ln4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DAAA4AD0-D2B9-43E0-A77F-9A75E242FDDB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12sth-sys_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "C12B7637-1E8F-44BF-939F-155701C182D4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12sth-sys:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "20712495-C1FB-4332-B5EB-B68CB951B05F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12stl-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "21C67B23-0146-4E42-8380-BADCF0FDAF5F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12stl-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "01576524-4AE1-4CE5-8909-8A2BBE579638"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12stl-if_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "64BFAF49-C93E-40B1-B5C6-2C45102AD111"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12stl-if:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3CDBDBAC-14FF-46CF-8E72-C8BD9B66A475"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12stn-c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "8DD20453-A699-4FAE-9144-CD35DCB1636B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12stn-c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "375F89CA-3F0E-4DA1-B044-93312B20561C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12stn-c-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "7AB356E7-1F23-42A3-8348-9D95FF3C3B40"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12stn-c-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C6C5E4B6-7AC4-4871-A43C-1233B84FD769"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12stn-e_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "4D5C7EBE-985F-40E8-920D-8E9A8C737B81"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12stn-e:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C40F79C0-3501-416E-A2B3-9C70D651E6C4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12stn-e-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "916310B5-8364-499B-82B1-03816A75C709"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12stn-e-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "834FE721-032F-462E-A12A-1FA38D1C24D9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12stn-h_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "E38FA954-FA36-4B54-A06B-834CC2599B2A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12stn-h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "08D3196D-E172-44D5-9949-451500B51C10"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12stn-h-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "97A64327-AC40-4DA6-9012-4AF88C73A758"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12stn-h-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8EF75784-1632-4F72-8B34-1B3B6A6331E9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12stn-l_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "7CB43433-8039-437A-B819-77193A5C64F4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12stn-l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7370CC87-C0E3-4B7B-B01A-564764122E86"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12stn-l-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "062E8B5E-A345-4E19-8E91-F7B06B5752CA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12stn-l-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D7CCE200-88DC-42C8-953D-4E422013708F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12stw-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "30A9396C-B4B4-42B8-9316-BC096B04C458"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12stw-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7DC3642F-DF65-4764-AFE1-96AF932266DA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x12stw-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "1B78F8FE-0170-4CC6-8CAE-98C1A885F702"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x12stw-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E906BDB2-075D-446D-A86C-B9D3B9E25216"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dac_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "4BE50492-07D8-4D1C-8AF9-763F25997CCC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dac:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D3600406-96B2-4E52-B5F9-9ABCED307EEC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dai-n_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "8633825D-939D-4826-A1BC-854ED2358A71"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dai-n:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0C5967E7-B9A7-4F23-B966-51F5C82B2529"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ddw-l_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "2DBD8FD0-2033-4486-B19B-3A65F8B96F16"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ddw-l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "94B75335-6871-4FA6-AC30-1C121C91195C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ddw-nt_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "992113EF-3E48-4F43-888F-A072499405E7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ddw-nt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3EFD3B3C-F46E-4B27-A16B-154DB9740ED4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dgo-t_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "61080B7E-47C7-4E4B-B9D4-E87F8AD13F7F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dgo-t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0093BCEF-E0F0-415B-8267-01B5D71F2E61"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dgq_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "6E07FCDD-A555-4FB1-8528-DC291A6B7989"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dgq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D77FE66F-DB11-4B35-8A60-943FA5803F14"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpd-l_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "416018C7-D968-4697-BB23-7D7C3F56307B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpd-l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28A547F9-4267-421E-A569-D73F937D6CB4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpd-m25_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "E31A20BA-EF06-4BD6-B22B-E6C14C5394B9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpd-m25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FF70FFB-8D20-4C4F-90B3-8681F94A6C0E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpff-sn_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "F0763501-BAEB-48FC-B74D-BCE5046C5011"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpff-sn:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "05703141-3375-468F-8F03-AFF548E95A39"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpff-snr_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "1577F719-7CA4-4386-A22B-6BED1815EA2C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpff-snr:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1610EF6F-D8A9-4AE4-AFD8-D8D82654E38E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpfr-s_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "7D9E2486-03BD-45DD-916A-AD72CA3E12CE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpfr-s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DAD78F27-1418-46B2-95D7-7A2DA82FFD88"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpfr-sn_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "540B3344-9C8B-40FB-AF8E-88AC654C928F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpfr-sn:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "21FB236D-9777-4318-AE9D-3D565992E6BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpg-hgx2_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "6753B838-73FA-4F3C-9851-EF3FCF6B4071"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpg-hgx2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "20492DE1-0D08-4769-83FF-16985A6E90F7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpg-ot-cpu_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "C7554A27-12B6-4D35-BA9B-07F8BB2FD237"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpg-ot-cpu:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1EFF8666-E52F-47ED-9330-11E36A75495C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpg-qt_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "356257AB-4E25-40E0-B4E6-189CF1C9E958"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpg-qt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8E309A80-F6FE-434D-B3EB-4593F18367A3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpg-sn_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "5BB2814E-3A02-42B1-BDC9-416452258F18"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpg-sn:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2C31C72A-AEF5-4F28-9EF8-00A19A39E7AA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dph-i_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "0CB2C0A8-13DE-4C20-AF87-8B7CF51890D7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dph-i:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F149C888-F3AF-49D4-BBBF-99ABC8E8CEDE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dph-t_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "F21135D9-BB90-47DC-B984-6E0843510DC8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dph-t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9780452F-4264-4069-9378-FE7F01D7ED1E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dph-tq_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "3567527E-5FC8-4E42-BFB3-4BF0FA7CF0FB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dph-tq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03E3CB77-7874-4B9B-B6D9-69D42304D6BE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpi-n_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "52D9057A-9494-41B2-9AE7-1E321BE1F556"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpi-n:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8CEB1846-2BD2-4326-BD22-14DDD05BB7BD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpi-nt_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "CE98E3AD-C668-422C-BD10-D7C813A38798"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpi-nt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F5553A6E-4BCB-4EC1-B002-EDDDD313F4E1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpl-i_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "27BB425D-F131-4F4C-AAB9-A0E31E072A9C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpl-i:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0EF59606-20D1-4E68-AE55-DA3F7101654F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dps-re_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "F562BE69-049C-4C9F-8E6B-EF46193F4D30"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dps-re:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED8E7045-1721-4629-B92C-F35C0B074245"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpt-b_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "FD5A0214-AA78-4957-AD08-B545D672672E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpt-b:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ABF7F546-1D85-4F99-9CFE-6F997402028D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpt-bh_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "39C8AE86-11D2-48C8-A068-10008D227EAB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpt-bh:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F00FAD5-FBDF-4239-9B1C-C012B5AC546A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpt-br_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "1B9D103C-EA4C-439C-82E4-9B8C5AAD8E51"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpt-br:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7710C62C-BFC9-4D9B-8EB1-A41273C06BF4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpt-l_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "05760878-E696-425C-8363-C6303DD6388A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpt-l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4F14E33F-DCD7-49D4-B0F5-AF924A87CC53"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpt-ps_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "DF579C83-C768-453F-B7D9-27C2005146A3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpt-ps:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "749EF1B5-F6A3-493F-B920-8033847BF037"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpu_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "D17A0787-A669-4566-BF40-4EC9131AA557"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpu:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "609DE3AA-044C-4B20-8A27-A507F4A11279"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpu-r_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "A6E571AC-93BD-4079-AC51-125778A009FC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpu-r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FF46B33-1765-44B9-A9B9-C3A97B5AD384"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpu-v_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "78E18E61-4068-4162-88E3-47D44BAA8497"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpu-v:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E125C5B7-7BB6-47EB-93A5-CA15FC082198"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpu-xll_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "6A906F07-7207-4674-A494-06C4E5134DB0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpu-xll:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3CB5CAA-C9D1-4508-BBE6-2546F6017715"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpu-z\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "304B5920-89F2-4FFB-9F61-6BBAE035E462"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpu-z\\+:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4ED5B015-0DB1-4E55-8C22-6DCE0BCC00FB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpu-ze\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "44F2BDAF-65AA-4845-BA04-BD0C3F1D09A0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpu-ze\\+:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "01852618-551E-4051-90E7-7A3386804A76"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dpx-t_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "6664EB3B-0C03-4435-8456-DA5CF230BD5D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dpx-t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3DB9F79B-70D5-4084-8DBF-E13CF76B77B7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dsc_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "697C92B5-B730-41CB-B656-5FBEA314255D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dsc:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5786F44D-9EE5-4C0B-9C01-F0D46762F7E2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dsc\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "3B4398AD-AA39-4044-A9B5-99481B8E2711"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dsc\\+:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6442E1D1-53D8-49F4-8D51-08CE45850A77"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dsf-e_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "297D1AD5-0139-4405-8ED8-AF4F5F96D56B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dsf-e:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BBDD9667-CE5C-487D-BC40-506D3722AD4C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dsn-ts_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "3C92890C-1FC8-4FD3-AAA7-38FC798C2C39"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dsn-ts:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA8F01F8-FA29-4E46-858F-149F94C8DBD4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11dsn-tsq_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "F4E875ED-157A-496D-849F-5E11E736178E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11dsn-tsq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DECCF4B6-A0FD-419E-A61B-7BC023555E7A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11opi-cpu_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "132E6AA4-EEFA-41BC-9535-4CBC915DCDD8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11opi-cpu:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "27164AC7-6D07-4D0D-AE90-8FB4C2498E6B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11opi-cpu-cl_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "5276403F-DBEA-4929-B0A0-7E240C22762D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11opi-cpu-cl:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A5E14473-022A-4472-8742-4BBB97A90047"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11qph\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "5597372A-F3D1-48C8-9C75-A3107D2F912A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11qph\\+:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E534D7BB-B73D-45F8-AB1A-CDC55B05D237"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11qpl_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "A46D5ED0-D590-4EC3-83BE-837ABB638A71"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11qpl:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8E668445-7698-42D3-87A8-C82FFAEDDA40"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11saa_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "04EF0829-6E03-4AEF-A970-0E5F1C06FB05"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11saa:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "97B2B57C-0599-4CD5-B886-B51907406530"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sae_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "2AE7457A-733F-4714-A741-E37C6847D5F5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sae:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "450DA6E7-7E1B-4E3F-916D-A04E8A64C9E0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sae-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "8FC62932-8F3B-457D-AF1A-18F93007D765"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sae-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9DED254-4F7C-4BA3-BDB4-C20046F1801D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sae-m_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "1349CFA0-2294-4EC3-ACCB-E202FBBC7F97"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sae-m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DCC976BD-381E-452C-ABB6-E90F7D39FB31"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11san_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "D1FECC94-F089-4A55-A1E0-5CD2DA011DEF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11san:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "16146E8A-A13C-4347-82B1-AD2FD7EEE710"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11san-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "35D0CE32-106C-485A-8B2B-111FCBCFFC20"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11san-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA94D270-1820-4325-ABAD-EF8B42D56DAB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sat_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B8886ED3-DDFB-44C0-870A-EF5E6F923921"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sat:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3F363C3-ACFB-4A15-9076-1C03E92DB138"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sat-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "4B93A5C2-9662-44D1-8DFD-562C844DB611"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sat-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F1C47C2-E481-40FF-BF6D-C327C1ABA050"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sba-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B448A736-AECF-4550-AB70-22A8BF030622"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sba-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FCF6EF1-D3E3-40CA-8AE4-BFFF37964541"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sba-ln4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "5C4D1A46-7763-4FEF-B32E-29494755028E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sba-ln4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2C15EA79-AC77-4254-821E-DCBD4748E73C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sca_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "61C8DCC0-DA05-44C2-BD5B-BA2BD2664A5C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sca:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2521B38-3BB4-4B96-AF7C-6BF429F0FC9C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sca-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "ABD3DBBD-BF92-4BAC-ADC3-B3002571533D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sca-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "577067B9-0F45-4A40-A75F-C7FE9B2B8855"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sca-w_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "14FC8981-EE22-446C-B3BA-43D4EA25F275"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sca-w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "683EB125-0F49-4199-9244-F17ECA6F6C4C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11scd-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "C89DE7EC-9EB2-40B0-80F5-8BF3527B74FE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11scd-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C89CC49B-01DE-4888-B0E4-B311C0F3F789"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sce-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B5739500-AB10-4CE2-95E2-F65EA2D2B779"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sce-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF53152-845A-4736-8FB0-C672D8A83F68"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sch-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "D70CE1AD-78BF-432A-84BC-5FD6BE4B6E5C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sch-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6E9B23E2-2E68-4E1D-A8B5-BAFB00DFB4BF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sch-ln4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "46071A5E-2291-4621-914F-3CBB3437036D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sch-ln4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "071A5B7E-6525-44DF-A612-DB63312AA3A9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11scl-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "0042216F-C5B6-4478-83D2-229E24ABF2FF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11scl-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D1528A2C-3983-4CF9-B365-7F307B93E466"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11scl-if_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "CB27048F-10BC-436B-A139-C33F861C3846"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11scl-if:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98595EB1-0B54-4E09-BAB1-4A37BCBB941A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11scl-ln4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "82DE3F62-F590-4293-8588-E47204D083AF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11scl-ln4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "586D8457-A684-4410-A48A-C5545F5B2003"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11scm-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "F63FE7EC-D7C5-43EE-9053-AE364588E98C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11scm-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B7B927B-1B10-41CC-8C8E-0DA456082C63"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11scm-ln8f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "849E1220-EC92-41B9-B27A-8B9E4EA04F6A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11scm-ln8f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0176160-C4E3-435E-8DDD-E992044C500B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11scq_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "CDEC4239-2014-4479-A810-932B2B68AF4F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11scq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "19DB281A-F2B0-48D9-83B9-21CB651D34E0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11scq-l_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "AB9C837A-E11A-4135-AE80-0CC6B910B380"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11scq-l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83A3CC6C-B6DA-4C5F-97FF-B7075C2D1936"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11scv-l_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "85D6B8BD-291B-4753-98C0-8629C962B6C5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11scv-l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F49DCD87-5179-4AB0-B859-79CE26145125"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11scv-q_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "30EF7DA2-51AC-4064-B679-DBE1A869C0F0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11scv-q:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA86A993-5A42-416E-B91A-54DC1719776F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11scw-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "3A35A0FA-76EA-411F-850A-A36AC20D2E1D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11scw-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FB564A1-E87A-4CAD-A8E8-5A22B0165B61"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11scz-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "FBAC3A63-BC83-4B2D-808B-7ED330764644"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11scz-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03512A43-F226-4E93-8D38-5C3513AD5478"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11scz-q_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "9E4854AD-2561-47BA-8248-E5F045FAB070"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11scz-q:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7A5ED2C4-0267-4F6C-BD29-9E0CEF01339E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdc-16c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "CB406DAD-3EFF-4934-A1E0-0CABEEBD1012"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdc-16c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F45F4322-46AA-4865-808A-90FBE12386C8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdc-4c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "CA85522C-E77A-4BF4-ABDE-3FE7D8E64D1C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdc-4c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8C4FE5EB-4CB5-449F-8BB5-DD7BEE5CD39C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdc-8c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "DCA3FA9E-71C5-4B9A-8C25-EADA4EF89FE7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdc-8c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4008F053-1E0C-477B-964F-9435801D09C4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdd-18c-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "6AA3FC73-9A4B-4292-8819-2F469343D824"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdd-18c-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EF1E70CB-BF44-4DE8-BA2F-47283586FA9B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdd-8c-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "2EEB618F-65C0-4AF7-BFC5-B33714346728"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdd-8c-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "39BD8B01-9630-463C-870C-76EC7FE2D325"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sds-12c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "4B3E9CA8-314E-4C07-AEC6-255A0B02122B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sds-12c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9B43F7A-EF17-498A-8AEA-F4E98547DCDA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sds-14c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "03E64734-7D31-4676-B04D-9FE1A05AA2AC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sds-14c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D2667BB-FE14-469F-9CC6-EB44B5B45DF3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sds-16c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "240EEEC9-91DC-48C9-A4A6-C753F2C1756B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sds-16c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83B921DB-EF3B-4E6C-B67A-6E57EF2CCB1C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sds-8c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "2F7ED116-0803-4FEB-BDF2-AA77619E0BB8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sds-8c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "25EA425D-7D25-44BA-A6E1-210349DC4AC2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdv-12c-tln2f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "CEE6ADCA-47F2-4A4A-9B68-65932856C66A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdv-12c-tln2f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5D77AED-1F86-4C4E-80D1-473C65DA3EF3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdv-12c-tp8f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "29DB0C5D-892E-4C44-92D9-A5B414A04C1D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdv-12c-tp8f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "97A5A305-FFE9-4F2C-94F9-9B4E8ED255EC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdv-16c\\+-tln2f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "E6653554-89E5-4F10-93DC-BAD4337D0DC1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdv-16c\\+-tln2f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "807D44E4-85DA-4F3D-BD0D-7393ABBDE9D2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdv-16c-tln2f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "1C967A95-9CA1-4EB5-B153-AAFFE7626823"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdv-16c-tln2f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DDC0B8F1-EAFB-44E0-B3B5-8A8D5EBD51E5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdv-16c-tp8f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "941D9F12-9CC3-482C-BE92-A7F920819331"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdv-16c-tp8f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3C5DDB30-1E22-42C1-8F9E-381004F9DDB5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdv-4c-tln2f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "895FF0B9-7EEA-467E-80AA-560A4B0793D4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdv-4c-tln2f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59D0561D-78DE-47B7-B8E5-E1D6F9BB73B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdv-4c-tp8f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "4371A185-BF71-49C7-9318-B0AD11B4AE69"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdv-4c-tp8f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C1ECBB36-CA02-4A8F-AC62-97C695E067C6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdv-4c-tp8f-01_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "CB9A43BC-5D86-427A-99D0-B19DAB2D94F7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdv-4c-tp8f-01:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F8CDF9F-2650-46A6-AC3A-5FC61C942E87"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdv-8c\\+-tln2f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "9E01FBF7-605E-469B-8B5A-6B26332CB704"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdv-8c\\+-tln2f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D935CA76-84EB-4B3D-A4EF-6BE8F8ED750E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdv-8c-tln2f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "A9819485-E143-481A-A058-420ECFF3C75B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdv-8c-tln2f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA40B6EF-E65E-4494-A368-41966BCAE70C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdv-8c-tp8f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "C125AF3D-A650-499E-85BB-6DAB33EC7C4F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdv-8c-tp8f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F58D8FAC-A913-431F-86FA-E7FF585684A6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdw-12c-tp13f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "33925DDC-A825-4029-A034-9BFF0C62F7A3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdw-12c-tp13f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3F8AA874-B736-4C30-BC48-8BDF1A21463D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdw-14c-tp13f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B6A7F79F-3632-424C-888A-314549607C14"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdw-14c-tp13f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B4B8CFE3-D081-4A65-8A5E-BEA397F9195C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdw-14cn-tp13f\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "8EFF4246-365E-4C50-B1CD-4F7EC0A281F3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdw-14cn-tp13f\\+:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0D58AEE8-3390-490C-A04F-9A3675FA7E6F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdw-14cnt-tp13f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "BA3304CB-E384-4A41-91C1-23023907B52D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdw-14cnt-tp13f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB50C171-3075-4A7C-97B9-6C48AE5E1222"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdw-16c-tp13f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "41005504-CE28-4228-8B06-512E2083F276"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdw-16c-tp13f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF949680-3AE1-4806-8A96-B7F50E9CAE0B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdw-16c-tp13f\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "0619F3CD-CC67-4827-AE3D-DD9CA646555E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdw-16c-tp13f\\+:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8CC6354D-DBB1-457C-B9C9-FAF2265BAE5B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdw-4c-tp13f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "265BCB39-7942-417E-AD82-D903C9E410E0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdw-4c-tp13f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5556FAA3-B53C-494A-8AB7-4942FE0E3757"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdw-4c-tp13f\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "71F71EA7-FE29-4DF6-A092-98A4019C12EC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdw-4c-tp13f\\+:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EAF047A7-2B8F-44DB-9D2E-AEA638E3CCBC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sdw-8c-tp13f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "927581C8-56FC-4EC2-9781-22F764BAE269"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sdw-8c-tp13f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9379DEA-1052-4A46-831F-A3F45CDF51C1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11spa-t_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "18630E63-C300-41AC-8729-4418C2A6DC6B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11spa-t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93841CE8-D876-44A3-A530-959CDB90FA7B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11spa-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "377B2DF6-3E30-43C1-8268-B41B967C43AA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11spa-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D6440101-3C85-427B-A930-014CCDA79CCD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11spd-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "78FD0BEE-D475-48B9-9125-DA0B043063B0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11spd-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B2EAD8C3-4C86-41EA-94C2-8A025BD11C96"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11spg-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "DF338C11-81EA-4D1E-8785-2EDB6BFBB17C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11spg-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0D4C8250-1682-4360-828F-8E7EE072CE6D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sph-nctf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "92B129E9-A4F6-4643-9FB9-443FCDD764AB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sph-nctf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0DABCA06-C8F1-4A20-9F85-69B49B3C5095"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sph-nctpf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "867CE591-8F70-4FA4-850C-B2490B7C19E1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sph-nctpf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ABF784B2-347A-4A62-9CC3-6A01624D0F07"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11spi-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "0F7BFD4D-CB73-460B-9E11-486817129495"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11spi-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "069F2E47-05DA-4676-9A11-B5059130720A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11spl-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "ED404BD7-9873-485F-ABC4-D27470ED113A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11spl-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "372B1F73-010B-4E12-A643-336741265B23"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11spm-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B5956F7D-ADB1-4B1F-B5E7-60E68DC13E14"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11spm-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1023FE03-0D76-4F33-ADC3-4502BD8AAE79"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11spm-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "5C4BA06E-A3CD-42E4-96BC-F16BCA654F75"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11spm-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "09E13FF0-04D4-41CD-97B8-1860028F8F8F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11spm-tpf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "482E5372-9001-42F5-A800-DECB62D6218D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11spm-tpf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6D4232C6-8C0B-41B1-AF69-A4E584756777"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11spw-ctf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B7D9E669-D0F7-41C8-9467-7CEE659F9818"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11spw-ctf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0BEF4BD-0962-4DC0-9329-5C28DAE78B93"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11spw-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "2903AFD1-DD53-45B9-AC45-EE4318953190"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11spw-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0998B7F1-CD28-4E07-8BA0-53EEEE9A25CF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sra_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "1E277DCF-D312-405B-87ED-8F2C849D1972"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sra:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FD640185-AC03-4235-A8BF-F71473A3D21B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sra-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "25863AED-0930-4B92-9543-B3ECDB41F6E6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sra-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E90E4534-1E54-4731-AFBF-5742274AAE1B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sra-rf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "26854260-D5B1-4896-BCC4-BDC300EC74F4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sra-rf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88A40C12-CDC6-4065-A65F-1ABB411BF12E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sri-if_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "671629CA-F04B-451F-8BE1-34E0AA5FE73C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sri-if:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92C0DDA9-ED3B-4DC8-B19E-19B9283A2C12"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11srl-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "F8C9D99F-51EF-436B-A632-6A287929C1E2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11srl-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "900E0C75-C843-4327-BAF2-F8077281D87E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11srm-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "87C66CF8-B9F6-4804-884B-0F99EDEF54A0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11srm-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "161177BA-5C2B-47DF-B900-568D0665020A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11srm-vf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "06A5E49A-5E22-4FC9-B669-C107F528EFBA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11srm-vf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB7EC704-0887-4743-AD5B-F9CF6EEE4B29"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssa-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "0892BBDA-B31B-4558-9C51-B129A4B0F9FD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssa-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "48D2E9CD-71D4-4556-A0F2-2C3B7FB8A77E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssd-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "05BCD88A-F10A-4F1D-B129-E6E34329EF1B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssd-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7B72F70A-B33E-4382-81DA-3864C2E14D41"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11sse-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "09C66363-58E4-4B8F-8D76-A5E61C40820F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11sse-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FC57F4A1-10F8-4926-A446-D2B8F05B8008"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssh-ctf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "3E763AED-58A3-4B45-BEE8-F0DBD2273C30"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssh-ctf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95CD6DEE-E000-42C2-825B-C29E3F7D725C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssh-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "05731059-73C8-4A9F-B651-62937B728767"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssh-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E7BE07CB-DED5-4810-9D04-884478CA1532"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssh-gf-1585_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "A2479843-DDFF-4B53-A42F-6E715D36D040"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssh-gf-1585:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D6430B42-E04A-4CEF-8318-074536119201"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssh-gf-1585l_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "67C4F018-28D7-4432-A5C2-7F04A1186EE0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssh-gf-1585l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "184762F2-E3A2-46F7-AC09-00DED69C7A4D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssh-gtf-1585_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "5B898C1E-1D08-445F-96E7-CC9C30AC264C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssh-gtf-1585:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D07E7DBE-010F-4F21-8B4D-18DE8BF59D9B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssh-gtf-1585l_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "321E79A8-251C-4CDF-8D82-B8AECE80B377"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssh-gtf-1585l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "54CCEFD5-FE80-42A5-8ED1-BEE9BCAA21AB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssh-ln4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "DDA317E8-5F90-4C3E-B2DB-5BB843F7036D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssh-ln4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "063C19C8-9A26-4457-A969-0172FA2E2BE4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssh-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "2574D409-99F0-4B5A-A083-F70A67641D7E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssh-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FDF932E7-ABDF-4541-B032-D013D881A25D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssi-ln4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "EE805506-31AB-4A37-BB72-46E279AB2824"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssi-ln4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "00A6A4DB-ED52-4DF1-809D-ADCA9F8324A1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssl_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "98116A5B-3572-4FC5-A2B5-17AA4A8B7D22"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssl:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0DA4B4D9-59CF-43D3-ACBE-8091C257C8FE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssl-cf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "7155E1B1-3F93-4A45-A0DD-E3207567C2A9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssl-cf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0FA01B7B-0A5F-48AC-811C-BB6EB4C78719"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssl-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "DB8E9380-7211-4291-8A20-B824788DD361"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssl-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F59AC9E2-69C0-42EF-82D3-F304D4918E8D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssl-nf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "6135023F-487A-494D-93BD-00B6B1AB5FE3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssl-nf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "84671D8E-00A2-4AC1-9B7E-9B7BB5188B3C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssm_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "51BE935C-26D0-40D3-BD89-E687FB03D822"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E28641A6-F24E-493D-B57B-954DA91F47B4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssm-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "AC8C1870-205D-4274-AC1E-97520C8D84DA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssm-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1EC19D26-080D-4B5A-A41C-253D00036608"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssn-e_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "9024100A-B534-4767-AD82-6D68B35F528D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssn-e:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "36D80443-7089-4484-B9F5-029BAFF1A5BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssn-e-001_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "7AF85C30-B3D3-4AA0-BB47-8514B07AA9E1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssn-e-001:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EDF406B5-6051-429F-B4BA-B5FCC3438E2E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssn-e-vdc_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "F7509A40-6C8A-4158-A291-08423AF67D8D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssn-e-vdc:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3311514-CCB7-423F-9CD7-A0AF63E5EC4A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssn-e-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B9F9EDD4-B350-47A8-968D-0CA7807D1656"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssn-e-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E16D25E7-A713-4B72-B386-A6DFD024AA5A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssn-h_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "AF8C94B5-5FA5-4C5B-B6CB-3D77C0E9B309"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssn-h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0000DB52-9B92-45B5-BB63-4C694E3714D1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssn-h-001_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "AD96DBC3-6110-48D0-A88A-46379D24AAD8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssn-h-001:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D35739F-DF6C-47A1-A4FB-B3415F33AD55"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssn-h-vdc_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "48BC8AA2-8DF0-4B73-9AF6-476F20C9805B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssn-h-vdc:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D97BA507-5721-4360-BBF2-65D94C038C51"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssn-h-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "77D5EBA8-4A56-4E31-85C4-E257BB87EDD5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssn-h-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D376009A-CE57-4389-837A-C1933B95FC4F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssn-l_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "252C49DA-308D-4CD1-8E6E-BC63F6246DD8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssn-l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D25709E2-5B71-428A-8D67-2963903C12BD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssn-l-001_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "679DC010-4BBD-4BB7-B3E6-7ACB466B3039"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssn-l-001:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8CED7FE1-ACF5-4FDF-8942-A1F3DF583242"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssn-l-vdc_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "18CAAC39-7134-42A3-A1F1-D4E28C7B8CB6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssn-l-vdc:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A9F87DA-EDA8-47FB-8574-F3BFE24C7D03"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssn-l-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "B1C89DDB-53B4-4C64-9DE8-1D355E625B38"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssn-l-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "68216C46-DBCB-4666-AE4A-4EC895571367"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssq_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "636DF182-2C81-4E3D-A574-D8954178E876"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8573A582-A52A-4006-99F0-D42C3AE5B722"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssq-l_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "D6798F23-3EFB-4E50-B008-4387EA7BD64B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssq-l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03CC1ABD-321B-4680-AFCC-5E4AD6E1A903"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssv-lvds_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "C525E969-B16D-4B77-B26A-8DB59E2C3E94"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssv-lvds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7A7D90D9-531C-4904-BEB5-35CED4F4670A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssv-m4_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "1AC7954D-DD60-4681-811F-E283D1945990"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssv-m4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DA13087-4F08-484F-8083-104A48E533C7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssv-m4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "918880F9-7E0D-4EE9-A3F2-6076CF56FDCC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssv-m4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D258D3F-A52F-4E7F-9883-CC48A49A31D1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssv-q_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "A44B5078-FF02-44D9-993E-9920D6CB69B4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssv-q:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "90CB1E05-C42D-43F9-95F5-258C87A9A67D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssw-4tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "CCAD1C84-44A4-4DF3-B986-CC74B9BE1D07"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssw-4tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6089DFBF-A190-4A4C-9DD8-1DA4D539A5F1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssw-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "EC58D65B-87D2-4EEF-9869-B8843EF7DD39"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssw-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6CDDDC18-753F-496F-9953-5B91ED1CC0F3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssw-tf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "8B851DE0-7AB2-446B-97FA-B01258045317"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssw-tf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3A180D6C-1A5B-41E0-A4CA-99CD49CBF585"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssz-f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "AB458920-62A4-46BB-A9D1-D8DEAAF031CA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssz-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "25DA80D6-C893-4B91-94ED-9FE4403DC6E0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssz-qf_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "0E796E38-6EE5-407F-B461-A44E47A3DE23"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssz-qf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A003C87A-7055-497C-B320-DF15F0D112D8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11ssz-tln4f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "897E7B81-6038-4F64-8B7D-F0099DF2BB88"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11ssz-tln4f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C338781-88C1-476A-A3C9-2018016BF2EC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11swn-c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "CDD7E679-7040-454D-A158-7AAB9364AA78"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11swn-c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E34FEF2D-51C2-4FC9-AC2A-7A40BDA5EDA8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11swn-c-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "2476AEA6-1961-48B9-91C7-39668153AD49"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11swn-c-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59F6BF1F-A8EC-4A61-9BBC-0B46877BE366"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11swn-e_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "35F1718A-6782-42C3-9CBF-506D8C5FBD76"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11swn-e:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "830F9903-EF91-48E0-ACEB-76C629886680"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11swn-e-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "A611E64F-3E3F-4B7F-AC97-B138B864A3E4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11swn-e-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F5FE79CD-C7B6-458E-82F0-1D6DBA9AC2B5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11swn-h_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "32FB8458-08DB-4EF0-AC9D-D3E6059CD697"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11swn-h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7493C93F-A80C-4F19-BA3E-BB0C7FE95BE1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11swn-h-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "158059FE-ECB1-47D9-9C28-9544D006833B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11swn-h-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "09B2349B-0BDF-4B73-91D8-756D81900C5B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11swn-l_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "0EB394CD-C7B8-4967-8846-E59E904BA0BB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11swn-l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ECBDA83D-46FC-42E6-AA22-EA312946352C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:supermicro:x11swn-l-wohs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.17.02",
+ "matchCriteriaId": "BB93281C-B13A-40C2-88E5-199AB3FE3E26"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:supermicro:x11swn-l-wohs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D58DB7DA-B8C4-4E37-BAFE-574CA01A9691"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "http://supermicro.com",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://www.supermicro.com/en/support/security_BMC_Dec_2023",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35039.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35039.json
index 2d4ade6f46d..1d5e6ae7065 100644
--- a/CVE-2023/CVE-2023-350xx/CVE-2023-35039.json
+++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35039.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-35039",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-07T12:15:07.360",
- "lastModified": "2023-12-07T16:09:27.937",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:54:28.523",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Restriction of Excessive Authentication Attempts vulnerability in Be Devious Web Development Password Reset with Code for WordPress REST API allows Authentication Abuse.This issue affects Password Reset with Code for WordPress REST API: from n/a through 0.0.15.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de restricci\u00f3n inadecuada de intentos de autenticaci\u00f3n excesivos en Be Devious Web Development Password Reset with Code para la API REST de WordPress permite el abuso de autenticaci\u00f3n. Este problema afecta el restablecimiento de contrase\u00f1a con c\u00f3digo para la API REST de WordPress: desde n/a hasta 0.0.15."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:bedevious:password_reset_with_code_for_wordpress_rest_api:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "0.0.16",
+ "matchCriteriaId": "0EC5E2E4-D488-448D-8114-3D69166960EE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/bdvs-password-reset/wordpress-password-reset-with-code-for-wordpress-rest-api-plugin-0-0-15-privilege-escalation-due-to-weak-pin-generation-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35619.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35619.json
new file mode 100644
index 00000000000..78234016be4
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35619.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35619",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:16.913",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Microsoft Outlook for Mac Spoofing Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35619",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35621.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35621.json
new file mode 100644
index 00000000000..6afaca261f1
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35621.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35621",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:17.090",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Microsoft Dynamics 365 Finance and Operations Denial of Service Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35621",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35622.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35622.json
new file mode 100644
index 00000000000..b28faf0df95
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35622.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35622",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:17.260",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Windows DNS Spoofing Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35622",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35624.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35624.json
new file mode 100644
index 00000000000..fefca38eb83
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35624.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35624",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:17.440",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Azure Connected Machine Agent Elevation of Privilege Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.3,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35624",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35625.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35625.json
new file mode 100644
index 00000000000..3b96b822570
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35625.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35625",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:17.620",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Azure Machine Learning Compute Instance for SDK Users Information Disclosure Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.0,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35625",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35628.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35628.json
new file mode 100644
index 00000000000..cd225010857
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35628.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35628",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:17.807",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Windows MSHTML Platform Remote Code Execution Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35628",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35629.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35629.json
new file mode 100644
index 00000000000..c20afbcaeda
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35629.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35629",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:17.990",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Microsoft USBHUB 3.0 Device Driver Remote Code Execution Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "PHYSICAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35629",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35630.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35630.json
new file mode 100644
index 00000000000..3ede2baa07f
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35630.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35630",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:18.183",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Internet Connection Sharing (ICS) Remote Code Execution Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35630",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35631.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35631.json
new file mode 100644
index 00000000000..7a891575949
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35631.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35631",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:18.360",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Win32k Elevation of Privilege Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35631",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35632.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35632.json
new file mode 100644
index 00000000000..0052fb1e552
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35632.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35632",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:18.547",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35632",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35633.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35633.json
new file mode 100644
index 00000000000..f5cb980f579
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35633.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35633",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:18.760",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Windows Kernel Elevation of Privilege Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35633",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35634.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35634.json
new file mode 100644
index 00000000000..e2ccec2a77c
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35634.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35634",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:18.937",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Windows Bluetooth Driver Remote Code Execution Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.0,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35634",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35635.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35635.json
new file mode 100644
index 00000000000..fa6748bdae7
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35635.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35635",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:19.107",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Windows Kernel Denial of Service Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35635",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35636.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35636.json
new file mode 100644
index 00000000000..0cf021aebee
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35636.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35636",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:19.277",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Microsoft Outlook Information Disclosure Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35636",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35638.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35638.json
new file mode 100644
index 00000000000..8e68276b676
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35638.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35638",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:19.460",
+ "lastModified": "2023-12-12T18:58:44.580",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "DHCP Server Service Denial of Service Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35638",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35639.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35639.json
new file mode 100644
index 00000000000..62c80a7767e
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35639.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35639",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:19.643",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Microsoft ODBC Driver Remote Code Execution Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35639",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35641.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35641.json
new file mode 100644
index 00000000000..2293cbb2105
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35641.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35641",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:19.823",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Internet Connection Sharing (ICS) Remote Code Execution Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35641",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35642.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35642.json
new file mode 100644
index 00000000000..75fd8c01be1
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35642.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35642",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:19.993",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Internet Connection Sharing (ICS) Denial of Service Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35642",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35643.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35643.json
new file mode 100644
index 00000000000..41c3cc7f0cd
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35643.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35643",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:20.263",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "DHCP Server Service Information Disclosure Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35643",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35644.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35644.json
new file mode 100644
index 00000000000..962f6e7c868
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35644.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-35644",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:20.517",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Windows Sysmain Service Elevation of Privilege"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35644",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35909.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35909.json
index 193ac9183f9..c482d34faa2 100644
--- a/CVE-2023/CVE-2023-359xx/CVE-2023-35909.json
+++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35909.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-35909",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-07T12:15:07.610",
- "lastModified": "2023-12-07T16:09:27.937",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:53:56.970",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled Resource Consumption vulnerability in Saturday Drive Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress leading to DoS.This issue affects Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress: from n/a through 3.6.25.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de consumo de recursos incontrolado en Saturday Drive Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder para WordPress que conduce a DoS. Este problema afecta a Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder para WordPress: desde n/a hasta 3.6.25."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "3.6.26",
+ "matchCriteriaId": "CD598414-0E33-4984-84D8-92A633BAD957"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ninja-forms/wordpress-ninja-forms-plugin-3-6-25-denial-of-service-attack-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36003.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36003.json
new file mode 100644
index 00000000000..2618c82fe4b
--- /dev/null
+++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36003.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-36003",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:20.697",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "XAML Diagnostics Elevation of Privilege Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36003",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36004.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36004.json
new file mode 100644
index 00000000000..a1bda36067a
--- /dev/null
+++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36004.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-36004",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:20.890",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Windows DPAPI (Data Protection Application Programming Interface) Spoofing Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36004",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36005.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36005.json
new file mode 100644
index 00000000000..60e8a530ddf
--- /dev/null
+++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36005.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-36005",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:21.070",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Windows Telephony Server Elevation of Privilege Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36005",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36006.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36006.json
new file mode 100644
index 00000000000..3a43d88990e
--- /dev/null
+++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36006.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-36006",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:21.250",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36006",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36009.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36009.json
new file mode 100644
index 00000000000..a0289564423
--- /dev/null
+++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36009.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-36009",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:21.430",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Microsoft Word Information Disclosure Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36009",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36010.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36010.json
new file mode 100644
index 00000000000..ddfb48b5d33
--- /dev/null
+++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36010.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-36010",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:21.610",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Microsoft Defender Denial of Service Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36010",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36011.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36011.json
new file mode 100644
index 00000000000..f439f354e33
--- /dev/null
+++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36011.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-36011",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:21.793",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Win32k Elevation of Privilege Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36011",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36012.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36012.json
new file mode 100644
index 00000000000..05a0e1e728b
--- /dev/null
+++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36012.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-36012",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:21.970",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "DHCP Server Service Information Disclosure Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36012",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36019.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36019.json
new file mode 100644
index 00000000000..64d2467efa3
--- /dev/null
+++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36019.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-36019",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:22.157",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Microsoft Power Platform Connector Spoofing Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.6,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36019",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36020.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36020.json
new file mode 100644
index 00000000000..d843fefb8e5
--- /dev/null
+++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36020.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-36020",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:22.333",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.6,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 4.7
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36020",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36391.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36391.json
new file mode 100644
index 00000000000..eb9d2ab1244
--- /dev/null
+++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36391.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-36391",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:22.510",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Local Security Authority Subsystem Service Elevation of Privilege Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36391",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36655.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36655.json
index 931765a58f6..a11a52a8929 100644
--- a/CVE-2023/CVE-2023-366xx/CVE-2023-36655.json
+++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36655.json
@@ -2,23 +2,86 @@
"id": "CVE-2023-36655",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-06T16:15:07.047",
- "lastModified": "2023-12-06T18:49:19.267",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:39:02.243",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The login REST API in ProLion CryptoSpike 3.0.15P2 (when LDAP or Active Directory is used as the users store) allows a remote blocked user to login and obtain an authentication token by specifying a username with different uppercase/lowercase character combination."
+ },
+ {
+ "lang": "es",
+ "value": "La API REST de inicio de sesi\u00f3n en ProLion CryptoSpike 3.0.15P2 (cuando se utiliza LDAP o Active Directory como tienda de usuarios) permite a un usuario bloqueado remoto iniciar sesi\u00f3n y obtener un token de autenticaci\u00f3n especificando un nombre de usuario con una combinaci\u00f3n diferente de caracteres en may\u00fasculas y min\u00fasculas."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:prolion:cryptospike:3.0.15:p2:*:*:*:*:*:*",
+ "matchCriteriaId": "51A592E8-274C-4A8A-B925-075FCA82DD22"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://prolion.com/cryptospike/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2023-36655",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36696.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36696.json
new file mode 100644
index 00000000000..b71bb2e3fa3
--- /dev/null
+++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36696.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-36696",
+ "sourceIdentifier": "secure@microsoft.com",
+ "published": "2023-12-12T18:15:22.690",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@microsoft.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36696",
+ "source": "secure@microsoft.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38694.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38694.json
new file mode 100644
index 00000000000..1aeabb52569
--- /dev/null
+++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38694.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-38694",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-12-12T17:15:07.917",
+ "lastModified": "2023-12-12T17:22:30.567",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Umbraco is an ASP.NET content management system (CMS). Starting in version 8.0.0 and prior to versions 8.18.10, 10.7.0, and 12.1.0, a user with access to a specific part of the backoffice is able to inject HTML code into a form where it is not intended. Versions 8.18.10, 10.7.0, and 12.1.0 contain a patch for this issue."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.5,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-xxc6-35r7-796w",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39167.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39167.json
index d0e07d4f66f..049b855946e 100644
--- a/CVE-2023/CVE-2023-391xx/CVE-2023-39167.json
+++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39167.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-39167",
"sourceIdentifier": "info@cert.vde.com",
"published": "2023-12-07T14:15:07.467",
- "lastModified": "2023-12-07T16:09:27.937",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:43:09.240",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In\u00a0SENEC Storage Box V1,V2 and V3 an unauthenticated remote attacker can obtain the devices' logfiles that contain sensitive data."
+ },
+ {
+ "lang": "es",
+ "value": "En SENEC Storage Box V1, V2 y V3, un atacante remoto no autenticado puede obtener los archivos de registro de los dispositivos que contienen datos confidenciales."
}
],
"metrics": {
@@ -36,8 +40,18 @@
},
"weaknesses": [
{
- "source": "info@cert.vde.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ },
+ {
+ "source": "info@cert.vde.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -46,10 +60,101 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023-06-19",
+ "matchCriteriaId": "8C6796ED-84F3-47E8-BD21-5CEBC1DD62E0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:enbw:senec_storage_box:v1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A73E447-D78F-420B-B256-1F157A6DA364"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023-06-19",
+ "matchCriteriaId": "8C6796ED-84F3-47E8-BD21-5CEBC1DD62E0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:enbw:senec_storage_box:v2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "300B219B-45CA-44C0-AC39-D94057FA8860"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023-06-19",
+ "matchCriteriaId": "8C6796ED-84F3-47E8-BD21-5CEBC1DD62E0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:enbw:senec_storage_box:v3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "449C542C-CAE3-42A9-BF45-EE6E828A4EBE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://seclists.org/fulldisclosure/2023/Nov/5",
- "source": "info@cert.vde.com"
+ "source": "info@cert.vde.com",
+ "tags": [
+ "Exploit",
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39169.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39169.json
index 2212b3b1504..13b9ed67702 100644
--- a/CVE-2023/CVE-2023-391xx/CVE-2023-39169.json
+++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39169.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-39169",
"sourceIdentifier": "info@cert.vde.com",
"published": "2023-12-07T15:15:07.777",
- "lastModified": "2023-12-07T16:09:27.937",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:57:54.800",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The affected devices use publicly available default credentials with administrative privileges."
+ },
+ {
+ "lang": "es",
+ "value": "Los dispositivos afectados utilizan credenciales predeterminadas disponibles p\u00fablicamente con privilegios administrativos."
}
],
"metrics": {
@@ -36,8 +40,18 @@
},
"weaknesses": [
{
- "source": "info@cert.vde.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-798"
+ }
+ ]
+ },
+ {
+ "source": "info@cert.vde.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -46,10 +60,98 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF2C3F5B-266D-455B-944D-9EDBB0268439"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:enbw:senec_storage_box:v1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A73E447-D78F-420B-B256-1F157A6DA364"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF2C3F5B-266D-455B-944D-9EDBB0268439"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:enbw:senec_storage_box:v2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "300B219B-45CA-44C0-AC39-D94057FA8860"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF2C3F5B-266D-455B-944D-9EDBB0268439"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:enbw:senec_storage_box:v3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "449C542C-CAE3-42A9-BF45-EE6E828A4EBE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://seclists.org/fulldisclosure/2023/Nov/3",
- "source": "info@cert.vde.com"
+ "source": "info@cert.vde.com",
+ "tags": [
+ "Mailing List",
+ "Not Applicable",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39171.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39171.json
index b61c9f50b33..34e6fe64943 100644
--- a/CVE-2023/CVE-2023-391xx/CVE-2023-39171.json
+++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39171.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-39171",
"sourceIdentifier": "info@cert.vde.com",
"published": "2023-12-07T15:15:09.990",
- "lastModified": "2023-12-07T16:09:27.937",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:59:53.220",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SENEC Storage Box V1,V2 and V3 accidentially expose a management UI accessible with publicly known admin credentials."
+ },
+ {
+ "lang": "es",
+ "value": "SENEC Storage Box V1, V2 y V3 exponen accidentalmente una interfaz de usuario de administraci\u00f3n a la que se puede acceder con credenciales de administrador conocidas p\u00fablicamente."
}
],
"metrics": {
@@ -46,10 +50,101 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023-06-19",
+ "matchCriteriaId": "8C6796ED-84F3-47E8-BD21-5CEBC1DD62E0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:enbw:senec_storage_box:v1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A73E447-D78F-420B-B256-1F157A6DA364"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023-06-19",
+ "matchCriteriaId": "8C6796ED-84F3-47E8-BD21-5CEBC1DD62E0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:enbw:senec_storage_box:v2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "300B219B-45CA-44C0-AC39-D94057FA8860"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023-06-19",
+ "matchCriteriaId": "8C6796ED-84F3-47E8-BD21-5CEBC1DD62E0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:enbw:senec_storage_box:v3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "449C542C-CAE3-42A9-BF45-EE6E828A4EBE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://seclists.org/fulldisclosure/2023/Nov/2",
- "source": "info@cert.vde.com"
+ "source": "info@cert.vde.com",
+ "tags": [
+ "Exploit",
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39172.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39172.json
index bfc97be2c69..4f8e95d2f34 100644
--- a/CVE-2023/CVE-2023-391xx/CVE-2023-39172.json
+++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39172.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-39172",
"sourceIdentifier": "info@cert.vde.com",
"published": "2023-12-07T14:15:07.883",
- "lastModified": "2023-12-07T16:09:27.937",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:49:44.890",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The affected devices transmit sensitive information unencrypted allowing a remote unauthenticated attacker to capture and modify network traffic."
+ },
+ {
+ "lang": "es",
+ "value": "Los dispositivos afectados transmiten informaci\u00f3n confidencial sin cifrar, lo que permite a un atacante remoto no autenticado capturar y modificar el tr\u00e1fico de la red."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
{
"source": "info@cert.vde.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-319"
+ }
+ ]
+ },
{
"source": "info@cert.vde.com",
"type": "Secondary",
@@ -46,10 +80,97 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF2C3F5B-266D-455B-944D-9EDBB0268439"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:enbw:senec_storage_box:v1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A73E447-D78F-420B-B256-1F157A6DA364"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF2C3F5B-266D-455B-944D-9EDBB0268439"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:enbw:senec_storage_box:v2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "300B219B-45CA-44C0-AC39-D94057FA8860"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF2C3F5B-266D-455B-944D-9EDBB0268439"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:enbw:senec_storage_box:v3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "449C542C-CAE3-42A9-BF45-EE6E828A4EBE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://seclists.org/fulldisclosure/2023/Nov/4",
- "source": "info@cert.vde.com"
+ "source": "info@cert.vde.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39326.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39326.json
index b5df2ed4bac..b4ece48f6f5 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39326.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39326.json
@@ -2,31 +2,111 @@
"id": "CVE-2023-39326",
"sourceIdentifier": "security@golang.org",
"published": "2023-12-06T17:15:07.147",
- "lastModified": "2023-12-06T18:49:19.267",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:27:55.297",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small."
+ },
+ {
+ "lang": "es",
+ "value": "Un remitente HTTP malicioso puede usar extensiones de fragmentos para hacer que un receptor que lea el cuerpo de una solicitud o respuesta lea muchos m\u00e1s bytes de la red que los que hay en el cuerpo. Un cliente HTTP malicioso puede aprovechar esto a\u00fan m\u00e1s para hacer que un servidor lea autom\u00e1ticamente una gran cantidad de datos (hasta aproximadamente 1 GiB) cuando un controlador no puede leer el cuerpo completo de una solicitud. Las extensiones fragmentadas son una caracter\u00edstica HTTP poco utilizada que permite incluir metadatos adicionales en el cuerpo de una solicitud o respuesta enviada utilizando la codificaci\u00f3n fragmentada. El lector de codificaci\u00f3n fragmentada net/http descarta estos metadatos. Un remitente puede aprovechar esto insertando un segmento de metadatos grande con cada byte transferido. El lector de fragmentos ahora produce un error si la proporci\u00f3n entre el cuerpo real y los bytes codificados es demasiado peque\u00f1a."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.20.12",
+ "matchCriteriaId": "17AC9A37-6678-490D-88C2-08DE6D37F16C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.21.0-0",
+ "versionEndExcluding": "1.21.5",
+ "matchCriteriaId": "F9B8295D-576D-410E-B65C-96DB303CBA5C"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://go.dev/cl/547335",
- "source": "security@golang.org"
+ "source": "security@golang.org",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://go.dev/issue/64433",
- "source": "security@golang.org"
+ "source": "security@golang.org",
+ "tags": [
+ "Issue Tracking",
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ",
- "source": "security@golang.org"
+ "source": "security@golang.org",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2382",
- "source": "security@golang.org"
+ "source": "security@golang.org",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39538.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39538.json
index 76e5f3ed4b5..c9a5d3f7cdf 100644
--- a/CVE-2023/CVE-2023-395xx/CVE-2023-39538.json
+++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39538.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-39538",
"sourceIdentifier": "biossecurity@ami.com",
"published": "2023-12-06T16:15:07.277",
- "lastModified": "2023-12-06T18:49:19.267",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:29:07.987",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAMI AptioV contains a vulnerability in BIOS where a User may cause an unrestricted upload of a BMP Logo file with dangerous type by Local access. A successful exploit of this vulnerability may lead to a loss of Confidentiality, Integrity, and/or Availability.\u00a0\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "AMI AptioV contiene una vulnerabilidad en BIOS donde un usuario puede provocar una carga sin restricciones de un archivo de logotipo BMP con un tipo peligroso mediante acceso local. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar una p\u00e9rdida de confidencialidad, integridad y/o disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
{
"source": "biossecurity@ami.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ },
{
"source": "biossecurity@ami.com",
"type": "Secondary",
@@ -50,10 +84,30 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ami:aptio_v:*:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7C73298F-5F7B-43DF-8772-567ACCE6D7FD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023009.pdf",
- "source": "biossecurity@ami.com"
+ "source": "biossecurity@ami.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39539.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39539.json
index 34ebbc51f7c..4bde069d4b9 100644
--- a/CVE-2023/CVE-2023-395xx/CVE-2023-39539.json
+++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39539.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-39539",
"sourceIdentifier": "biossecurity@ami.com",
"published": "2023-12-06T16:15:07.510",
- "lastModified": "2023-12-06T18:49:19.267",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:28:52.040",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAMI AptioV contains a vulnerability in BIOS where a User may cause an unrestricted upload of a PNG Logo file with dangerous type by Local access. A successful exploit of this vulnerability may lead to a loss of Confidentiality, Integrity, and/or Availability.\u00a0\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "AMI AptioV contiene una vulnerabilidad en BIOS donde un usuario puede provocar una carga sin restricciones de un archivo de logotipo PNG con un tipo peligroso mediante acceso local. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar una p\u00e9rdida de confidencialidad, integridad y/o disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
{
"source": "biossecurity@ami.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ },
{
"source": "biossecurity@ami.com",
"type": "Secondary",
@@ -50,10 +84,30 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ami:aptio_v:*:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7C73298F-5F7B-43DF-8772-567ACCE6D7FD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023009.pdf",
- "source": "biossecurity@ami.com"
+ "source": "biossecurity@ami.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39909.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39909.json
index 1b60c18c734..63ecdb04683 100644
--- a/CVE-2023/CVE-2023-399xx/CVE-2023-39909.json
+++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39909.json
@@ -2,19 +2,79 @@
"id": "CVE-2023-39909",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T18:15:07.547",
- "lastModified": "2023-12-07T18:30:52.097",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T18:20:27.780",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Ericsson Network Manager before 23.2 mishandles Access Control and thus unauthenticated low-privilege users can access the NCM application."
+ },
+ {
+ "lang": "es",
+ "value": "Ericsson Network Manager anterior a 23.2 maneja mal el control de acceso y, por lo tanto, los usuarios no autenticados con pocos privilegios pueden acceder a la aplicaci\u00f3n NCM."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ericsson:network_manager:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "23.2",
+ "matchCriteriaId": "ED57F506-963F-4192-B5A9-FECE633F4236"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://www.gruppotim.it/it/footer/red-team.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40238.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40238.json
index 16e3a2c3676..72823a9020c 100644
--- a/CVE-2023/CVE-2023-402xx/CVE-2023-40238.json
+++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40238.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40238",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T04:15:06.790",
- "lastModified": "2023-12-07T12:12:36.717",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T15:13:33.960",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,19 +14,110 @@
"value": "Se descubri\u00f3 un problema de LogoFAIL en BmpDecoderDxe en Insyde InsydeH2O con kernel 5.2 anterior a 05.28.47, 5.3 anterior a 05.37.47, 5.4 anterior a 05.45.47, 5.5 anterior a 05.53.47 y 5.6 anterior a 05.60.47 para ciertos dispositivos Lenovo. El an\u00e1lisis de im\u00e1genes de archivos de logotipos BMP manipulados puede copiar datos a una direcci\u00f3n espec\u00edfica durante la fase DXE de la ejecuci\u00f3n UEFI. Esto ocurre debido a un error de firma de enteros que involucra PixelHeight y PixelWidth durante la compresi\u00f3n RLE4/RLE8."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-312"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.2",
+ "versionEndExcluding": "5.2.05.28.47",
+ "matchCriteriaId": "789083DE-7DBF-4943-A1BE-B82472E6FA3A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.3",
+ "versionEndExcluding": "5.3.05.37.47",
+ "matchCriteriaId": "08AB501F-EF6C-42C2-996C-DDEF497A79BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.4",
+ "versionEndExcluding": "5.4.05.45.47",
+ "matchCriteriaId": "D8015F0C-512D-46B6-9FCA-3FC015D33F43"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.5",
+ "versionEndExcluding": "5.5.05.53.47",
+ "matchCriteriaId": "16CCE808-25A8-4EBE-82D8-4CA1792FE198"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.6",
+ "versionEndExcluding": "5.6.05.60.47",
+ "matchCriteriaId": "814A299E-F6E9-4A1A-A1AD-CC5E7E063FB8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://binarly.io/posts/finding_logofail_the_dangers_of_image_parsing_during_system_boot/index.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit"
+ ]
},
{
"url": "https://www.insyde.com/security-pledge",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.insyde.com/security-pledge/SA-2023053",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40300.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40300.json
index bd1299fc095..fa01534698b 100644
--- a/CVE-2023/CVE-2023-403xx/CVE-2023-40300.json
+++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40300.json
@@ -2,19 +2,78 @@
"id": "CVE-2023-40300",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T18:15:07.597",
- "lastModified": "2023-12-07T18:30:52.097",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T18:55:01.573",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "NETSCOUT nGeniusPULSE 3.8 has a Hardcoded Cryptographic Key."
+ },
+ {
+ "lang": "es",
+ "value": "NETSCOUT nGeniusPULSE 3.8 tiene una clave criptogr\u00e1fica codificada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-798"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netscout:ngeniuspulse:3.8.0-0.2349.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB6D702D-3E57-4E5A-9DEA-299566922543"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://www.netscout.com/securityadvisories",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-411xx/CVE-2023-41106.json b/CVE-2023/CVE-2023-411xx/CVE-2023-41106.json
index 346ede30633..b8ffb37bbd6 100644
--- a/CVE-2023/CVE-2023-411xx/CVE-2023-41106.json
+++ b/CVE-2023/CVE-2023-411xx/CVE-2023-41106.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-41106",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T05:15:09.110",
- "lastModified": "2023-12-07T12:12:36.717",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:08:33.227",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,19 +14,434 @@
"value": "Se descubri\u00f3 un problema en Zimbra Collaboration (ZCS) antes de 10.0.3. Un atacante puede obtener acceso a una cuenta de Zimbra. Esto tambi\u00e9n se solucion\u00f3 en el parche 35 9.0.0 y el parche 42 8.8.15."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "8.8.15",
+ "matchCriteriaId": "1A604F85-992D-4CCF-8630-0456B92429BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.0.0",
+ "versionEndExcluding": "10.0.3",
+ "matchCriteriaId": "C38B73CC-A184-446D-A585-B9C55F07EAC4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*",
+ "matchCriteriaId": "1B17C1A7-0F0A-4E7C-8C0C-0BBB0BF66C82"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:*",
+ "matchCriteriaId": "BA48C450-201C-4398-AB65-EF6F95FB0380"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:*",
+ "matchCriteriaId": "5F759114-CF2D-48BF-8D09-EBE8D1ED1949"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:*",
+ "matchCriteriaId": "AE8BD950-24A2-4AFF-B7EE-6EE115BD75D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:*",
+ "matchCriteriaId": "C43634F5-2946-44D2-8A50-B717374A8126"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:*",
+ "matchCriteriaId": "20315895-5410-4B88-B2D9-E9C5D79A64DF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:*",
+ "matchCriteriaId": "BF405091-A832-4945-87EC-AA525F37DF91"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:*",
+ "matchCriteriaId": "C9B6FFA8-CFD2-47C6-9475-79210CB9AA84"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:*",
+ "matchCriteriaId": "964CA714-937C-4FC0-A1E9-07F846C786BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:*",
+ "matchCriteriaId": "DAF8F155-1406-46ED-A81F-BCC4CE525F43"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:*",
+ "matchCriteriaId": "56A8F56B-3457-4C19-B213-3B04FEE8D7A5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:*",
+ "matchCriteriaId": "B4F8D255-3F91-45FF-9133-4023BA688F9E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:*",
+ "matchCriteriaId": "37BC4DF5-D111-4295-94FC-AA8929CDF2A1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:*",
+ "matchCriteriaId": "A9D50108-0404-4791-8057-DB1786D311C8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:*",
+ "matchCriteriaId": "F2A7E53F-8EAC-4DA9-8EAE-117759EFABEF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:*",
+ "matchCriteriaId": "858727DB-AE6F-435D-B8FD-6C94C3400E40"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:*",
+ "matchCriteriaId": "3FA6AC95-288C-4ABA-B2A7-47E4134EDC31"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:*",
+ "matchCriteriaId": "4AA82728-5901-482A-83CF-F883D4B6A8E5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:*",
+ "matchCriteriaId": "7E762792-542E-43D0-A95A-E7F48F328A28"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:*",
+ "matchCriteriaId": "6DD4641A-EC23-4B1A-8729-9AECD70390AF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:*",
+ "matchCriteriaId": "E0E3E825-1D1E-4ECD-B306-DD8BDCDD0547"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:*",
+ "matchCriteriaId": "840F98DC-57F1-4054-A6C1-6E7F0340AC2C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:*",
+ "matchCriteriaId": "EE2A1305-68B7-4CB7-837F-4EDE2EBED507"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:*",
+ "matchCriteriaId": "21768A61-7578-4EEC-A23B-FEC10CAA9EDF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p30:*:*:*:*:*:*",
+ "matchCriteriaId": "CA758408-4302-43BC-BDC9-1B70EC5D2FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p31:*:*:*:*:*:*",
+ "matchCriteriaId": "822CDEBC-0650-4970-B46F-06F505993086"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p32:*:*:*:*:*:*",
+ "matchCriteriaId": "971B5005-4676-4D93-A7DD-6AFDC8D0BEEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p33:*:*:*:*:*:*",
+ "matchCriteriaId": "81BC6A7F-D014-44B3-9361-20DB256D3C8D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p34:*:*:*:*:*:*",
+ "matchCriteriaId": "6A3DC694-4CCC-4E9F-B6E9-891B1DF115C8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p35:*:*:*:*:*:*",
+ "matchCriteriaId": "3810385E-95E8-491E-8281-394125DB04F4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p37:*:*:*:*:*:*",
+ "matchCriteriaId": "C08B5A0A-2935-4FEB-9133-4B35E1AB0CDB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:*",
+ "matchCriteriaId": "661403E7-1D65-4710-8413-47D74FF65BE4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p40:*:*:*:*:*:*",
+ "matchCriteriaId": "4CD3AEF8-0667-40B9-BCAA-6C9CA7D9C495"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p41:*:*:*:*:*:*",
+ "matchCriteriaId": "A0F8BB82-32E4-463D-B719-8E5186CAAECC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:*",
+ "matchCriteriaId": "0695D2E0-45B3-493C-BA6D-471B90C0ACC5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:*",
+ "matchCriteriaId": "714FAFE6-68AE-4304-B040-48BC46F85A2D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:*",
+ "matchCriteriaId": "73FC2D2D-8BBD-4259-8B35-0D9BFA40567B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:*",
+ "matchCriteriaId": "AB97E9E6-CC4A-458D-B731-6D51130B942C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:*",
+ "matchCriteriaId": "BA688C43-846A-4C4A-AEDB-113D967D3D73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "685D9652-2934-4C13-8B36-40582C79BFC1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:*",
+ "matchCriteriaId": "5E4DF01A-1AA9-47E8-82FD-65A02ECA1376"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:*",
+ "matchCriteriaId": "BDE59185-B917-4A81-8DE4-C65A079F52FE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:*",
+ "matchCriteriaId": "BA3ED95F-95F2-4676-8EAF-B4B9EB64B260"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:*",
+ "matchCriteriaId": "4BB93336-CC3C-4B7F-B194-7DED036ABBAF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:*",
+ "matchCriteriaId": "876F1675-F65C-4E86-ADBD-36EB8D8A997D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:*",
+ "matchCriteriaId": "2306F526-9C56-4A57-AA9B-02F2D6058C97"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:*",
+ "matchCriteriaId": "F9EA2A61-67AA-4B7E-BC6E-80EB1363EF85"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:*",
+ "matchCriteriaId": "C77A35B7-96F6-43A7-A747-C6AEEDE961E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:*",
+ "matchCriteriaId": "DC35882B-E709-42D8-8800-F1B734CEAFC3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:*",
+ "matchCriteriaId": "B7A47276-F241-4A68-9458-E1481EBDC5E6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:*",
+ "matchCriteriaId": "12D0D469-6C9B-4B66-9581-DC319773238A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:*",
+ "matchCriteriaId": "40629BEB-DF4B-4FB8-8D3D-7BAC43C90766"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:*",
+ "matchCriteriaId": "9503131F-CC23-4545-AE9C-9714B287CC25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:*",
+ "matchCriteriaId": "B4CE2D12-AD31-4FED-AD0F-ADF64E92E1B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:*",
+ "matchCriteriaId": "8113A4E3-AA96-4382-815D-6FD88BA42EC5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:*",
+ "matchCriteriaId": "DC8C28E0-6C51-41EE-A7B2-DB185D1D8FD0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:*",
+ "matchCriteriaId": "BC19F11D-23D9-429D-A957-D67F23A40A01"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:*",
+ "matchCriteriaId": "AAFA2EE7-C965-4F27-8CAE-E607A9F202AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:*",
+ "matchCriteriaId": "1D09DCF6-1C8F-4CA1-B7D4-AFDD4EB35771"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:*",
+ "matchCriteriaId": "C52705E6-2C6B-47BC-A0CD-F6AAE0BFC302"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p33:*:*:*:*:*:*",
+ "matchCriteriaId": "D659AE6A-591E-4D5B-9781-9648250F5576"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p34:*:*:*:*:*:*",
+ "matchCriteriaId": "E4054E3E-561C-4B1C-A615-3CCE5CB69D77"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:*",
+ "matchCriteriaId": "33F50D8C-7027-4A8D-8E95-98C224283772"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:*",
+ "matchCriteriaId": "82000BA4-1781-4312-A7BD-92EC94D137AE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:*",
+ "matchCriteriaId": "4B52D301-2559-457A-8FFB-F0915299355A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:*",
+ "matchCriteriaId": "7215AE2C-8A33-4AB9-88D5-7C8CD11E806C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D859F77-8E39-4D46-BC90-C5C1D805A666"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:*",
+ "matchCriteriaId": "CDC810C7-45DA-4BDF-9138-2D3B2750243E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:*",
+ "matchCriteriaId": "E09D95A4-764D-4E0B-8605-1D94FD548AB2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/11/17/2",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://wiki.zimbra.com/wiki/Security_Center",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-411xx/CVE-2023-41172.json b/CVE-2023/CVE-2023-411xx/CVE-2023-41172.json
index 3c768e53cba..7b3fa0b55af 100644
--- a/CVE-2023/CVE-2023-411xx/CVE-2023-41172.json
+++ b/CVE-2023/CVE-2023-411xx/CVE-2023-41172.json
@@ -2,19 +2,78 @@
"id": "CVE-2023-41172",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T18:15:07.937",
- "lastModified": "2023-12-07T18:30:52.097",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T18:11:23.157",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "NetScout nGeniusONE 6.3.4 build 2298 allows a Stored Cross-Site scripting vulnerability (issue 4 of 4)."
+ },
+ {
+ "lang": "es",
+ "value": "NetScout nGeniusONE 6.3.4 build 2298 permite una vulnerabilidad de Cross-Site Scripting (XSS) Almacenada (problema 4 de 4)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netscout:ngeniusone:6.3.4:build2298:*:*:*:*:*:*",
+ "matchCriteriaId": "5E324F69-A8E5-47DF-AEEF-FCC789220B59"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://www.netscout.com/securityadvisories",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-418xx/CVE-2023-41804.json b/CVE-2023/CVE-2023-418xx/CVE-2023-41804.json
index 63fc6185b9f..257e0467a7a 100644
--- a/CVE-2023/CVE-2023-418xx/CVE-2023-41804.json
+++ b/CVE-2023/CVE-2023-418xx/CVE-2023-41804.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-41804",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-07T11:15:07.807",
- "lastModified": "2023-12-07T12:12:22.533",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:59:18.847",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -50,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:brainstormforce:starter_templates:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "3.2.5",
+ "matchCriteriaId": "65132DDD-016E-4101-A907-2D99ED33338F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/astra-sites/wordpress-starter-templates-plugin-3-2-4-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41905.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41905.json
index 419fe652a91..a5e65139bd7 100644
--- a/CVE-2023/CVE-2023-419xx/CVE-2023-41905.json
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41905.json
@@ -2,19 +2,78 @@
"id": "CVE-2023-41905",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T18:15:07.980",
- "lastModified": "2023-12-07T18:30:52.097",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T18:10:29.040",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "NETSCOUT nGeniusONE 6.3.4 build 2298 allows a Reflected Cross-Site scripting (XSS) vulnerability by an authenticated user."
+ },
+ {
+ "lang": "es",
+ "value": "NETSCOUT nGeniusONE 6.3.4 build 2298 permite una vulnerabilidad de Cross-Site scripting (XSS) Reflejada por parte de un usuario autenticado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netscout:ngeniusone:6.3.4:build2298:*:*:*:*:*:*",
+ "matchCriteriaId": "5E324F69-A8E5-47DF-AEEF-FCC789220B59"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://www.netscout.com/securityadvisories",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41913.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41913.json
index 83ca5ab4728..66c795e6209 100644
--- a/CVE-2023/CVE-2023-419xx/CVE-2023-41913.json
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41913.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-41913",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T05:15:09.173",
- "lastModified": "2023-12-07T12:12:36.717",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:07:01.363",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,15 +14,75 @@
"value": "strongSwan anterior a 5.9.12 tiene un desbordamiento del b\u00fafer y una posible ejecuci\u00f3n remota de c\u00f3digo no autenticado a trav\u00e9s de un valor p\u00fablico DH que excede el b\u00fafer interno en el proxy DH de charon-tkm. La primera versi\u00f3n afectada es la 5.3.0. Un ataque puede ocurrir a trav\u00e9s de un mensaje IKE_SA_INIT manipulado."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-120"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.3.0",
+ "versionEndExcluding": "5.9.12",
+ "matchCriteriaId": "C5256E77-93AF-47BF-BD3F-0148F8E9D0B4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/strongswan/strongswan/releases",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-41913%29.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42580.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42580.json
index f83cd9e601a..52cc8509a06 100644
--- a/CVE-2023/CVE-2023-425xx/CVE-2023-42580.json
+++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42580.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42580",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2023-12-05T03:15:19.120",
- "lastModified": "2023-12-05T13:51:04.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:09:19.990",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
@@ -38,10 +58,43 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:samsung:galaxy_store:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "4.5.64.4",
+ "matchCriteriaId": "0ACEF30C-D21F-488C-A1D5-55CEEE49C724"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=12",
- "source": "mobile.security@samsung.com"
+ "source": "mobile.security@samsung.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42581.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42581.json
index 36a2b086d74..358e61dd365 100644
--- a/CVE-2023/CVE-2023-425xx/CVE-2023-42581.json
+++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42581.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-42581",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2023-12-05T03:15:19.293",
- "lastModified": "2023-12-11T20:33:24.510",
+ "lastModified": "2023-12-12T17:08:44.080",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -21,20 +21,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "availabilityImpact": "HIGH",
- "baseScore": 9.8,
- "baseSeverity": "CRITICAL"
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
- "impactScore": 5.9
+ "impactScore": 3.6
},
{
"source": "mobile.security@samsung.com",
diff --git a/CVE-2023/CVE-2023-431xx/CVE-2023-43102.json b/CVE-2023/CVE-2023-431xx/CVE-2023-43102.json
index 9fc19da6caf..47faa87432c 100644
--- a/CVE-2023/CVE-2023-431xx/CVE-2023-43102.json
+++ b/CVE-2023/CVE-2023-431xx/CVE-2023-43102.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43102",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T06:15:54.490",
- "lastModified": "2023-12-07T12:12:36.717",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:11:13.437",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,15 +14,436 @@
"value": "Se descubri\u00f3 un problema en Zimbra Collaboration (ZCS) antes de 10.0.4. Se puede aprovechar un problema XSS para acceder al buz\u00f3n de correo de un usuario autenticado. Esto tambi\u00e9n se solucion\u00f3 en el parche 43 8.8.15 y el parche 36 9.0.0."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "8.8.15",
+ "matchCriteriaId": "1A604F85-992D-4CCF-8630-0456B92429BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.0.0",
+ "versionEndExcluding": "10.0.4",
+ "matchCriteriaId": "15BA556D-FE45-42D3-A625-DEC85C82E170"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*",
+ "matchCriteriaId": "1B17C1A7-0F0A-4E7C-8C0C-0BBB0BF66C82"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:*",
+ "matchCriteriaId": "BA48C450-201C-4398-AB65-EF6F95FB0380"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:*",
+ "matchCriteriaId": "5F759114-CF2D-48BF-8D09-EBE8D1ED1949"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:*",
+ "matchCriteriaId": "AE8BD950-24A2-4AFF-B7EE-6EE115BD75D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:*",
+ "matchCriteriaId": "C43634F5-2946-44D2-8A50-B717374A8126"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:*",
+ "matchCriteriaId": "20315895-5410-4B88-B2D9-E9C5D79A64DF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:*",
+ "matchCriteriaId": "BF405091-A832-4945-87EC-AA525F37DF91"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:*",
+ "matchCriteriaId": "C9B6FFA8-CFD2-47C6-9475-79210CB9AA84"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:*",
+ "matchCriteriaId": "964CA714-937C-4FC0-A1E9-07F846C786BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:*",
+ "matchCriteriaId": "DAF8F155-1406-46ED-A81F-BCC4CE525F43"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:*",
+ "matchCriteriaId": "56A8F56B-3457-4C19-B213-3B04FEE8D7A5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:*",
+ "matchCriteriaId": "B4F8D255-3F91-45FF-9133-4023BA688F9E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:*",
+ "matchCriteriaId": "37BC4DF5-D111-4295-94FC-AA8929CDF2A1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:*",
+ "matchCriteriaId": "A9D50108-0404-4791-8057-DB1786D311C8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:*",
+ "matchCriteriaId": "F2A7E53F-8EAC-4DA9-8EAE-117759EFABEF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:*",
+ "matchCriteriaId": "858727DB-AE6F-435D-B8FD-6C94C3400E40"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:*",
+ "matchCriteriaId": "3FA6AC95-288C-4ABA-B2A7-47E4134EDC31"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:*",
+ "matchCriteriaId": "4AA82728-5901-482A-83CF-F883D4B6A8E5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:*",
+ "matchCriteriaId": "7E762792-542E-43D0-A95A-E7F48F328A28"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:*",
+ "matchCriteriaId": "6DD4641A-EC23-4B1A-8729-9AECD70390AF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:*",
+ "matchCriteriaId": "E0E3E825-1D1E-4ECD-B306-DD8BDCDD0547"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:*",
+ "matchCriteriaId": "840F98DC-57F1-4054-A6C1-6E7F0340AC2C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:*",
+ "matchCriteriaId": "EE2A1305-68B7-4CB7-837F-4EDE2EBED507"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:*",
+ "matchCriteriaId": "21768A61-7578-4EEC-A23B-FEC10CAA9EDF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p30:*:*:*:*:*:*",
+ "matchCriteriaId": "CA758408-4302-43BC-BDC9-1B70EC5D2FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p31:*:*:*:*:*:*",
+ "matchCriteriaId": "822CDEBC-0650-4970-B46F-06F505993086"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p32:*:*:*:*:*:*",
+ "matchCriteriaId": "971B5005-4676-4D93-A7DD-6AFDC8D0BEEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p33:*:*:*:*:*:*",
+ "matchCriteriaId": "81BC6A7F-D014-44B3-9361-20DB256D3C8D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p34:*:*:*:*:*:*",
+ "matchCriteriaId": "6A3DC694-4CCC-4E9F-B6E9-891B1DF115C8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p35:*:*:*:*:*:*",
+ "matchCriteriaId": "3810385E-95E8-491E-8281-394125DB04F4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p37:*:*:*:*:*:*",
+ "matchCriteriaId": "C08B5A0A-2935-4FEB-9133-4B35E1AB0CDB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:*",
+ "matchCriteriaId": "661403E7-1D65-4710-8413-47D74FF65BE4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p40:*:*:*:*:*:*",
+ "matchCriteriaId": "4CD3AEF8-0667-40B9-BCAA-6C9CA7D9C495"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p41:*:*:*:*:*:*",
+ "matchCriteriaId": "A0F8BB82-32E4-463D-B719-8E5186CAAECC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p42:*:*:*:*:*:*",
+ "matchCriteriaId": "9605C0CF-E5DF-497A-B298-D64ABCDAF88E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:*",
+ "matchCriteriaId": "0695D2E0-45B3-493C-BA6D-471B90C0ACC5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:*",
+ "matchCriteriaId": "714FAFE6-68AE-4304-B040-48BC46F85A2D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:*",
+ "matchCriteriaId": "73FC2D2D-8BBD-4259-8B35-0D9BFA40567B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:*",
+ "matchCriteriaId": "AB97E9E6-CC4A-458D-B731-6D51130B942C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:*",
+ "matchCriteriaId": "BA688C43-846A-4C4A-AEDB-113D967D3D73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "685D9652-2934-4C13-8B36-40582C79BFC1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:*",
+ "matchCriteriaId": "5E4DF01A-1AA9-47E8-82FD-65A02ECA1376"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:*",
+ "matchCriteriaId": "BDE59185-B917-4A81-8DE4-C65A079F52FE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:*",
+ "matchCriteriaId": "BA3ED95F-95F2-4676-8EAF-B4B9EB64B260"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:*",
+ "matchCriteriaId": "4BB93336-CC3C-4B7F-B194-7DED036ABBAF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:*",
+ "matchCriteriaId": "876F1675-F65C-4E86-ADBD-36EB8D8A997D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:*",
+ "matchCriteriaId": "2306F526-9C56-4A57-AA9B-02F2D6058C97"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:*",
+ "matchCriteriaId": "F9EA2A61-67AA-4B7E-BC6E-80EB1363EF85"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:*",
+ "matchCriteriaId": "C77A35B7-96F6-43A7-A747-C6AEEDE961E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:*",
+ "matchCriteriaId": "DC35882B-E709-42D8-8800-F1B734CEAFC3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:*",
+ "matchCriteriaId": "B7A47276-F241-4A68-9458-E1481EBDC5E6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:*",
+ "matchCriteriaId": "12D0D469-6C9B-4B66-9581-DC319773238A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:*",
+ "matchCriteriaId": "40629BEB-DF4B-4FB8-8D3D-7BAC43C90766"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:*",
+ "matchCriteriaId": "9503131F-CC23-4545-AE9C-9714B287CC25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:*",
+ "matchCriteriaId": "B4CE2D12-AD31-4FED-AD0F-ADF64E92E1B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:*",
+ "matchCriteriaId": "8113A4E3-AA96-4382-815D-6FD88BA42EC5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:*",
+ "matchCriteriaId": "DC8C28E0-6C51-41EE-A7B2-DB185D1D8FD0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:*",
+ "matchCriteriaId": "BC19F11D-23D9-429D-A957-D67F23A40A01"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:*",
+ "matchCriteriaId": "AAFA2EE7-C965-4F27-8CAE-E607A9F202AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:*",
+ "matchCriteriaId": "1D09DCF6-1C8F-4CA1-B7D4-AFDD4EB35771"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:*",
+ "matchCriteriaId": "C52705E6-2C6B-47BC-A0CD-F6AAE0BFC302"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p33:*:*:*:*:*:*",
+ "matchCriteriaId": "D659AE6A-591E-4D5B-9781-9648250F5576"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p34:*:*:*:*:*:*",
+ "matchCriteriaId": "E4054E3E-561C-4B1C-A615-3CCE5CB69D77"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p35:*:*:*:*:*:*",
+ "matchCriteriaId": "4FA0E9C4-25E4-4CD6-B88A-02B413385866"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:*",
+ "matchCriteriaId": "33F50D8C-7027-4A8D-8E95-98C224283772"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:*",
+ "matchCriteriaId": "82000BA4-1781-4312-A7BD-92EC94D137AE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:*",
+ "matchCriteriaId": "4B52D301-2559-457A-8FFB-F0915299355A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:*",
+ "matchCriteriaId": "7215AE2C-8A33-4AB9-88D5-7C8CD11E806C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D859F77-8E39-4D46-BC90-C5C1D805A666"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:*",
+ "matchCriteriaId": "CDC810C7-45DA-4BDF-9138-2D3B2750243E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:*",
+ "matchCriteriaId": "E09D95A4-764D-4E0B-8605-1D94FD548AB2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wiki.zimbra.com/wiki/Security_Center",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-431xx/CVE-2023-43103.json b/CVE-2023/CVE-2023-431xx/CVE-2023-43103.json
index 5bc3c432478..03000b4be38 100644
--- a/CVE-2023/CVE-2023-431xx/CVE-2023-43103.json
+++ b/CVE-2023/CVE-2023-431xx/CVE-2023-43103.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43103",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T06:15:54.630",
- "lastModified": "2023-12-07T12:12:36.717",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:10:33.093",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,15 +14,436 @@
"value": "Se descubri\u00f3 un problema XSS en un endpoint web en Zimbra Collaboration (ZCS) anterior a 10.0.4 a trav\u00e9s de un par\u00e1metro no sanitizado. Esto tambi\u00e9n se solucion\u00f3 en el parche 43 8.8.15 y el parche 36 9.0.0."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "8.8.15",
+ "matchCriteriaId": "1A604F85-992D-4CCF-8630-0456B92429BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.0.0",
+ "versionEndExcluding": "10.0.4",
+ "matchCriteriaId": "15BA556D-FE45-42D3-A625-DEC85C82E170"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*",
+ "matchCriteriaId": "1B17C1A7-0F0A-4E7C-8C0C-0BBB0BF66C82"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:*",
+ "matchCriteriaId": "BA48C450-201C-4398-AB65-EF6F95FB0380"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:*",
+ "matchCriteriaId": "5F759114-CF2D-48BF-8D09-EBE8D1ED1949"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:*",
+ "matchCriteriaId": "AE8BD950-24A2-4AFF-B7EE-6EE115BD75D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:*",
+ "matchCriteriaId": "C43634F5-2946-44D2-8A50-B717374A8126"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:*",
+ "matchCriteriaId": "20315895-5410-4B88-B2D9-E9C5D79A64DF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:*",
+ "matchCriteriaId": "BF405091-A832-4945-87EC-AA525F37DF91"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:*",
+ "matchCriteriaId": "C9B6FFA8-CFD2-47C6-9475-79210CB9AA84"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:*",
+ "matchCriteriaId": "964CA714-937C-4FC0-A1E9-07F846C786BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:*",
+ "matchCriteriaId": "DAF8F155-1406-46ED-A81F-BCC4CE525F43"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:*",
+ "matchCriteriaId": "56A8F56B-3457-4C19-B213-3B04FEE8D7A5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:*",
+ "matchCriteriaId": "B4F8D255-3F91-45FF-9133-4023BA688F9E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:*",
+ "matchCriteriaId": "37BC4DF5-D111-4295-94FC-AA8929CDF2A1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:*",
+ "matchCriteriaId": "A9D50108-0404-4791-8057-DB1786D311C8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:*",
+ "matchCriteriaId": "F2A7E53F-8EAC-4DA9-8EAE-117759EFABEF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:*",
+ "matchCriteriaId": "858727DB-AE6F-435D-B8FD-6C94C3400E40"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:*",
+ "matchCriteriaId": "3FA6AC95-288C-4ABA-B2A7-47E4134EDC31"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:*",
+ "matchCriteriaId": "4AA82728-5901-482A-83CF-F883D4B6A8E5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:*",
+ "matchCriteriaId": "7E762792-542E-43D0-A95A-E7F48F328A28"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:*",
+ "matchCriteriaId": "6DD4641A-EC23-4B1A-8729-9AECD70390AF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:*",
+ "matchCriteriaId": "E0E3E825-1D1E-4ECD-B306-DD8BDCDD0547"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:*",
+ "matchCriteriaId": "840F98DC-57F1-4054-A6C1-6E7F0340AC2C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:*",
+ "matchCriteriaId": "EE2A1305-68B7-4CB7-837F-4EDE2EBED507"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:*",
+ "matchCriteriaId": "21768A61-7578-4EEC-A23B-FEC10CAA9EDF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p30:*:*:*:*:*:*",
+ "matchCriteriaId": "CA758408-4302-43BC-BDC9-1B70EC5D2FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p31:*:*:*:*:*:*",
+ "matchCriteriaId": "822CDEBC-0650-4970-B46F-06F505993086"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p32:*:*:*:*:*:*",
+ "matchCriteriaId": "971B5005-4676-4D93-A7DD-6AFDC8D0BEEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p33:*:*:*:*:*:*",
+ "matchCriteriaId": "81BC6A7F-D014-44B3-9361-20DB256D3C8D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p34:*:*:*:*:*:*",
+ "matchCriteriaId": "6A3DC694-4CCC-4E9F-B6E9-891B1DF115C8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p35:*:*:*:*:*:*",
+ "matchCriteriaId": "3810385E-95E8-491E-8281-394125DB04F4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p37:*:*:*:*:*:*",
+ "matchCriteriaId": "C08B5A0A-2935-4FEB-9133-4B35E1AB0CDB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:*",
+ "matchCriteriaId": "661403E7-1D65-4710-8413-47D74FF65BE4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p40:*:*:*:*:*:*",
+ "matchCriteriaId": "4CD3AEF8-0667-40B9-BCAA-6C9CA7D9C495"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p41:*:*:*:*:*:*",
+ "matchCriteriaId": "A0F8BB82-32E4-463D-B719-8E5186CAAECC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p42:*:*:*:*:*:*",
+ "matchCriteriaId": "9605C0CF-E5DF-497A-B298-D64ABCDAF88E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:*",
+ "matchCriteriaId": "0695D2E0-45B3-493C-BA6D-471B90C0ACC5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:*",
+ "matchCriteriaId": "714FAFE6-68AE-4304-B040-48BC46F85A2D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:*",
+ "matchCriteriaId": "73FC2D2D-8BBD-4259-8B35-0D9BFA40567B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:*",
+ "matchCriteriaId": "AB97E9E6-CC4A-458D-B731-6D51130B942C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:*",
+ "matchCriteriaId": "BA688C43-846A-4C4A-AEDB-113D967D3D73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "685D9652-2934-4C13-8B36-40582C79BFC1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:*",
+ "matchCriteriaId": "5E4DF01A-1AA9-47E8-82FD-65A02ECA1376"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:*",
+ "matchCriteriaId": "BDE59185-B917-4A81-8DE4-C65A079F52FE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:*",
+ "matchCriteriaId": "BA3ED95F-95F2-4676-8EAF-B4B9EB64B260"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:*",
+ "matchCriteriaId": "4BB93336-CC3C-4B7F-B194-7DED036ABBAF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:*",
+ "matchCriteriaId": "876F1675-F65C-4E86-ADBD-36EB8D8A997D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:*",
+ "matchCriteriaId": "2306F526-9C56-4A57-AA9B-02F2D6058C97"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:*",
+ "matchCriteriaId": "F9EA2A61-67AA-4B7E-BC6E-80EB1363EF85"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:*",
+ "matchCriteriaId": "C77A35B7-96F6-43A7-A747-C6AEEDE961E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:*",
+ "matchCriteriaId": "DC35882B-E709-42D8-8800-F1B734CEAFC3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:*",
+ "matchCriteriaId": "B7A47276-F241-4A68-9458-E1481EBDC5E6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:*",
+ "matchCriteriaId": "12D0D469-6C9B-4B66-9581-DC319773238A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:*",
+ "matchCriteriaId": "40629BEB-DF4B-4FB8-8D3D-7BAC43C90766"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:*",
+ "matchCriteriaId": "9503131F-CC23-4545-AE9C-9714B287CC25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:*",
+ "matchCriteriaId": "B4CE2D12-AD31-4FED-AD0F-ADF64E92E1B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:*",
+ "matchCriteriaId": "8113A4E3-AA96-4382-815D-6FD88BA42EC5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:*",
+ "matchCriteriaId": "DC8C28E0-6C51-41EE-A7B2-DB185D1D8FD0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:*",
+ "matchCriteriaId": "BC19F11D-23D9-429D-A957-D67F23A40A01"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:*",
+ "matchCriteriaId": "AAFA2EE7-C965-4F27-8CAE-E607A9F202AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:*",
+ "matchCriteriaId": "1D09DCF6-1C8F-4CA1-B7D4-AFDD4EB35771"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:*",
+ "matchCriteriaId": "C52705E6-2C6B-47BC-A0CD-F6AAE0BFC302"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p33:*:*:*:*:*:*",
+ "matchCriteriaId": "D659AE6A-591E-4D5B-9781-9648250F5576"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p34:*:*:*:*:*:*",
+ "matchCriteriaId": "E4054E3E-561C-4B1C-A615-3CCE5CB69D77"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p35:*:*:*:*:*:*",
+ "matchCriteriaId": "4FA0E9C4-25E4-4CD6-B88A-02B413385866"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:*",
+ "matchCriteriaId": "33F50D8C-7027-4A8D-8E95-98C224283772"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:*",
+ "matchCriteriaId": "82000BA4-1781-4312-A7BD-92EC94D137AE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:*",
+ "matchCriteriaId": "4B52D301-2559-457A-8FFB-F0915299355A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:*",
+ "matchCriteriaId": "7215AE2C-8A33-4AB9-88D5-7C8CD11E806C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D859F77-8E39-4D46-BC90-C5C1D805A666"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:*",
+ "matchCriteriaId": "CDC810C7-45DA-4BDF-9138-2D3B2750243E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:*",
+ "matchCriteriaId": "E09D95A4-764D-4E0B-8605-1D94FD548AB2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wiki.zimbra.com/wiki/Security_Center",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43364.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43364.json
new file mode 100644
index 00000000000..7f8e7ef66c7
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43364.json
@@ -0,0 +1,36 @@
+{
+ "id": "CVE-2023-43364",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T18:15:22.887",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "main.py in Searchor before 2.4.2 uses eval on CLI input, which may cause unexpected code execution."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/ArjunSharda/Searchor/commit/16016506f7bf92b0f21f51841d599126d6fcd15b",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/ArjunSharda/Searchor/pull/130",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/advisories/GHSA-66m2-493m-crh2",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/nexis-nexis/Searchor-2.4.0-POC-Exploit-",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/nikn0laty/Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4421.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4421.json
new file mode 100644
index 00000000000..e3f8f821a6d
--- /dev/null
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4421.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-4421",
+ "sourceIdentifier": "security@mozilla.org",
+ "published": "2023-12-12T17:15:08.347",
+ "lastModified": "2023-12-12T17:22:30.567",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The NSS code used for checking PKCS#1 v1.5 was leaking information useful in mounting Bleichenbacher-like attacks. Both the overall correctness of the padding as well as the length of the encrypted message was leaking through timing side-channel. By sending large number of attacker-selected ciphertexts, the attacker would be able to decrypt a previously intercepted PKCS#1 v1.5 ciphertext (for example, to decrypt a TLS session that used RSA key exchange), or forge a signature using the victim's key. The issue was fixed by implementing the implicit rejection algorithm, in which the NSS returns a deterministic random message in case invalid padding is detected, as proposed in the Marvin Attack paper. This vulnerability affects NSS < 3.61."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1651411",
+ "source": "security@mozilla.org"
+ },
+ {
+ "url": "https://www.mozilla.org/security/advisories/mfsa2023-53/",
+ "source": "security@mozilla.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45083.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45083.json
index 0708b679085..14210df28af 100644
--- a/CVE-2023/CVE-2023-450xx/CVE-2023-45083.json
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45083.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45083",
"sourceIdentifier": "0a72a055-908d-47f5-a16a-1f09049c16c6",
"published": "2023-12-05T17:15:07.950",
- "lastModified": "2023-12-05T20:13:47.300",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:40:40.463",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An Improper Privilege Management vulnerability exists in HyperCloud that will impact the ability for a user to authenticate against the management plane.\n\nAn authenticated admin-level user may be able to delete the \"admin\" or \"serveradmin\" users, which prevents authentication from subsequently succeeding.\n\nThis issue affects HyperCloud versions 1.0 to any release before 2.1.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de gesti\u00f3n de privilegios inadecuada en HyperCloud que afectar\u00e1 la capacidad de un usuario para autenticarse en el plano de gesti\u00f3n. Un usuario de nivel de administrador autenticado puede eliminar los usuarios \"admin\" o \"serveadmin\", lo que impide que la autenticaci\u00f3n se realice correctamente posteriormente. Este problema afecta a las versiones 1.0 de HyperCloud hasta cualquier versi\u00f3n anterior a la 2.1."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 3.6
+ },
{
"source": "0a72a055-908d-47f5-a16a-1f09049c16c6",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
+ },
{
"source": "0a72a055-908d-47f5-a16a-1f09049c16c6",
"type": "Secondary",
@@ -46,10 +80,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softiron:hypercloud:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.0",
+ "versionEndExcluding": "2.1.0",
+ "matchCriteriaId": "554F36F7-6344-4F7A-A1BE-196927DD04E5"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://advisories.softiron.cloud",
- "source": "0a72a055-908d-47f5-a16a-1f09049c16c6"
+ "source": "0a72a055-908d-47f5-a16a-1f09049c16c6",
+ "tags": [
+ "Release Notes"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45084.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45084.json
index b22ecf66716..e983bd128df 100644
--- a/CVE-2023/CVE-2023-450xx/CVE-2023-45084.json
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45084.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45084",
"sourceIdentifier": "0a72a055-908d-47f5-a16a-1f09049c16c6",
"published": "2023-12-05T17:15:08.183",
- "lastModified": "2023-12-05T20:13:47.300",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:41:49.943",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue exists in SoftIron HyperCloud where drive caddy removal and reinsertion without a reboot may erroneously cause the system to recognize the caddy as new media and wipe all data on the drives due to a missing synchronization flaw, which impacts data availability and integrity.\n\nThis issue only impacts SoftIron HyperCloud \"density\" storage nodes running HyperCloud software versions 1.0 to before 2.0.3.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Existe un problema en SoftIron HyperCloud donde la extracci\u00f3n y reinserci\u00f3n del drive caddy sin reiniciar puede hacer que el sistema reconozca err\u00f3neamente el caddy como un medio nuevo y borre todos los datos de las unidades debido a una falla de sincronizaci\u00f3n faltante, lo que afecta la disponibilidad e integridad de los datos. Este problema solo afecta a los nodos de almacenamiento de \"density\" de SoftIron HyperCloud que ejecutan el software HyperCloud desde la versi\u00f3n 1.0 hasta la 2.0.3 anterior."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
+ "attackVector": "PHYSICAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 5.2
+ },
{
"source": "0a72a055-908d-47f5-a16a-1f09049c16c6",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-662"
+ }
+ ]
+ },
{
"source": "0a72a055-908d-47f5-a16a-1f09049c16c6",
"type": "Secondary",
@@ -46,10 +80,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softiron:hypercloud:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.0",
+ "versionEndExcluding": "2.0.3",
+ "matchCriteriaId": "1E1D94F5-3EE0-4D00-BF00-C08BB922F813"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://advisories.softiron.cloud",
- "source": "0a72a055-908d-47f5-a16a-1f09049c16c6"
+ "source": "0a72a055-908d-47f5-a16a-1f09049c16c6",
+ "tags": [
+ "Release Notes"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45085.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45085.json
index e86583ec7f2..4f389fd04d0 100644
--- a/CVE-2023/CVE-2023-450xx/CVE-2023-45085.json
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45085.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45085",
"sourceIdentifier": "0a72a055-908d-47f5-a16a-1f09049c16c6",
"published": "2023-12-05T17:15:08.400",
- "lastModified": "2023-12-05T20:13:47.300",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:14:09.460",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue exists in SoftIron HyperCloud where compute nodes may come online immediately without following the correct initialization process.\u00a0 In this instance, workloads may be scheduled on these nodes and deploy to a failed or erroneous state, which impacts the availability of these workloads that may be deployed during this time window.\n\nThis issue impacts HyperCloud versions from 2.0.0 to before 2.0.3.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Existe un problema en SoftIron HyperCloud donde los nodos de c\u00e1lculo pueden conectarse inmediatamente sin seguir el proceso de inicializaci\u00f3n correcto. En este caso, las cargas de trabajo pueden programarse en estos nodos y desplegarse en un estado fallido o err\u00f3neo, lo que afecta la disponibilidad de estas cargas de trabajo que pueden implementarse durante este per\u00edodo de tiempo. Este problema afecta a las versiones de HyperCloud desde la 2.0.0 hasta la 2.0.3 anterior."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 3.3,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 1.4
+ },
{
"source": "0a72a055-908d-47f5-a16a-1f09049c16c6",
"type": "Secondary",
@@ -34,10 +58,44 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-665"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softiron:hypercloud:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.0.0",
+ "versionEndExcluding": "2.0.3",
+ "matchCriteriaId": "FCFF9E8A-301B-4195-B0C7-0A97B7C64DAF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://advisories.softiron.cloud",
- "source": "0a72a055-908d-47f5-a16a-1f09049c16c6"
+ "source": "0a72a055-908d-47f5-a16a-1f09049c16c6",
+ "tags": [
+ "Release Notes"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45285.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45285.json
index 4a3b29632bf..8a01ac0fc23 100644
--- a/CVE-2023/CVE-2023-452xx/CVE-2023-45285.json
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45285.json
@@ -2,31 +2,110 @@
"id": "CVE-2023-45285",
"sourceIdentifier": "security@golang.org",
"published": "2023-12-06T17:15:07.320",
- "lastModified": "2023-12-06T18:49:19.267",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:27:36.273",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Using go get to fetch a module with the \".git\" suffix may unexpectedly fallback to the insecure \"git://\" protocol if the module is unavailable via the secure \"https://\" and \"git+ssh://\" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off)."
+ },
+ {
+ "lang": "es",
+ "value": "El uso de go get para buscar un m\u00f3dulo con el sufijo \".git\" puede recurrir inesperadamente al protocolo inseguro \"git://\" si el m\u00f3dulo no est\u00e1 disponible a trav\u00e9s de \"https://\" y \"git+ssh://\" seguros, protocolos, incluso si GOINSECURE no est\u00e1 configurado para dicho m\u00f3dulo. Esto s\u00f3lo afecta a los usuarios que no utilizan el proxy del m\u00f3dulo y est\u00e1n obteniendo m\u00f3dulos directamente (es decir, GOPROXY = desactivado)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.20.12",
+ "matchCriteriaId": "17AC9A37-6678-490D-88C2-08DE6D37F16C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.21.0-0",
+ "versionEndExcluding": "1.21.5",
+ "matchCriteriaId": "F9B8295D-576D-410E-B65C-96DB303CBA5C"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://go.dev/cl/540257",
- "source": "security@golang.org"
+ "source": "security@golang.org",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://go.dev/issue/63845",
- "source": "security@golang.org"
+ "source": "security@golang.org",
+ "tags": [
+ "Issue Tracking",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ",
- "source": "security@golang.org"
+ "source": "security@golang.org",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2383",
- "source": "security@golang.org"
+ "source": "security@golang.org",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45287.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45287.json
index d56612ef617..5ab95ef5a42 100644
--- a/CVE-2023/CVE-2023-452xx/CVE-2023-45287.json
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45287.json
@@ -2,35 +2,108 @@
"id": "CVE-2023-45287",
"sourceIdentifier": "security@golang.org",
"published": "2023-12-05T17:15:08.570",
- "lastModified": "2023-12-05T20:13:47.300",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:26:44.020",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels."
+ },
+ {
+ "lang": "es",
+ "value": "Antes de Go 1.20, los intercambios de claves TLS basados en RSA utilizaban la librer\u00eda math/big, que no es un tiempo constante. Se aplic\u00f3 blinding RSA para prevenir ataques sincronizados, pero el an\u00e1lisis muestra que esto puede no haber sido completamente efectivo. En particular, parece que la eliminaci\u00f3n del relleno PKCS#1 puede filtrar informaci\u00f3n de tiempo, que a su vez podr\u00eda usarse para recuperar bits de clave de sesi\u00f3n. En Go 1.20, la librer\u00eda crypto/tls cambi\u00f3 a una implementaci\u00f3n RSA de tiempo completamente constante, que no creemos que muestre ning\u00fan canal lateral de temporizaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-203"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.20.0",
+ "matchCriteriaId": "A96BDB4B-F1DA-4948-8E56-8B4933BB8BC2"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://go.dev/cl/326012/26",
- "source": "security@golang.org"
+ "source": "security@golang.org",
+ "tags": [
+ "Issue Tracking"
+ ]
},
{
"url": "https://go.dev/issue/20654",
- "source": "security@golang.org"
+ "source": "security@golang.org",
+ "tags": [
+ "Issue Tracking"
+ ]
},
{
"url": "https://groups.google.com/g/golang-announce/c/QMK8IQALDvA",
- "source": "security@golang.org"
+ "source": "security@golang.org",
+ "tags": [
+ "Mailing List",
+ "Release Notes"
+ ]
},
{
"url": "https://people.redhat.com/~hkario/marvin/",
- "source": "security@golang.org"
+ "source": "security@golang.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2375",
- "source": "security@golang.org"
+ "source": "security@golang.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45762.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45762.json
index 284b659711c..a58ee0b9c6e 100644
--- a/CVE-2023/CVE-2023-457xx/CVE-2023-45762.json
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45762.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45762",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-07T13:15:07.293",
- "lastModified": "2023-12-07T16:09:27.937",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:53:04.993",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Michael Uno (miunosoft) Responsive Column Widgets.This issue affects Responsive Column Widgets: from n/a through 1.2.7.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de redireccionamiento de URL a un sitio que no es de confianza ('Open Redirect') en Michael Uno (miunosoft) Responsive Column Widgets. Este problema afecta a Responsive Column Widgets: desde n/a hasta 1.2.7."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:michaeluno:responsive_column_widgets:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.2.7",
+ "matchCriteriaId": "2B6F2C0B-59F7-4B01-91CF-B0119C7319A3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/responsive-column-widgets/wordpress-responsive-column-widgets-plugin-1-2-7-open-redirection-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46157.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46157.json
index cc83c363f0a..cd677b4ed36 100644
--- a/CVE-2023/CVE-2023-461xx/CVE-2023-46157.json
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46157.json
@@ -2,23 +2,87 @@
"id": "CVE-2023-46157",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-08T13:15:07.193",
- "lastModified": "2023-12-08T14:23:10.393",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:13:08.513",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "File-Manager in MGT CloudPanel 2.0.0 through 2.3.2 allows the lowest privilege user to achieve OS command injection by changing file ownership and changing file permissions to 4755."
+ },
+ {
+ "lang": "es",
+ "value": "File-Manager en MGT CloudPanel 2.0.0 a 2.3.2 permite al usuario con privilegios m\u00e1s bajos lograr la inyecci\u00f3n de comandos del sistema operativo cambiando la propiedad del archivo y cambiando los permisos del archivo a 4755."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mgt-commerce:cloudpanel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.0.0",
+ "versionEndIncluding": "2.3.2",
+ "matchCriteriaId": "77EC376D-BB32-4F66-B8B4-E3F1273276AC"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://www.cloudpanel.io/docs/v2/changelog/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://www.mgt-commerce.com/docs/mgt-cloudpanel/dashboard",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46214.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46214.json
index ffe963c67cc..3078917f821 100644
--- a/CVE-2023/CVE-2023-462xx/CVE-2023-46214.json
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46214.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-46214",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-11-16T21:15:08.630",
- "lastModified": "2023-11-24T23:07:00.743",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-12-12T16:15:08.030",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46218.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46218.json
index 5dd1d24d397..5648aecc390 100644
--- a/CVE-2023/CVE-2023-462xx/CVE-2023-46218.json
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46218.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-46218",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-12-07T01:15:07.160",
- "lastModified": "2023-12-10T03:15:07.003",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T15:53:14.470",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,19 +14,102 @@
"value": "Esta falla permite que un servidor HTTP malicioso establezca \"supercookies\" en curl que luego se devuelven a m\u00e1s or\u00edgenes de los que est\u00e1n permitidos o son posibles. Esto permite que un sitio establezca cookies que luego se enviar\u00e1n a sitios y dominios diferentes y no relacionados. Podr\u00eda hacer esto explotando una falla de may\u00fasculas y min\u00fasculas en la funci\u00f3n de curl que verifica un dominio de cookie determinado con Public Suffix List (PSL). Por ejemplo, una cookie podr\u00eda configurarse con `domain=co.UK` cuando la URL utilizaba un nombre de host en min\u00fascula `curl.co.uk`, aunque `co.uk` aparezca como un dominio PSL."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.46.0",
+ "versionEndIncluding": "8.4.0",
+ "matchCriteriaId": "CDCA27BA-B527-4B8F-91D5-CEE58282FD45"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://curl.se/docs/CVE-2023-46218.html",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://hackerone.com/reports/2212193",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Exploit",
+ "Issue Tracking",
+ "Patch",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ZX3VW67N4ACRAPMV2QS2LVYGD7H2MVE/",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46307.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46307.json
index baa6e52d0fb..ede337d4d00 100644
--- a/CVE-2023/CVE-2023-463xx/CVE-2023-46307.json
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46307.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-46307",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T06:15:54.683",
- "lastModified": "2023-12-07T12:12:27.987",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:06:02.260",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,23 +14,89 @@
"value": "Se descubri\u00f3 un problema en server.js en etcd-browser 87ae63d75260. Al proporcionar una entrada /../../../ Directory Traversal a la solicitud GET de la URL mientras se conecta al puerto del servidor remoto especificado durante la configuraci\u00f3n, un atacante puede recuperar archivos del sistema operativo local desde el sistema remoto."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:buddho:etcd_browser:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8CE6FF10-564C-460D-AF37-2B4C2DF43C7D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Nov/11",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Nov/9",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://hub.docker.com/r/buddho/etcd-browser",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://hub.docker.com/r/buddho/etcd-browser/tags",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46454.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46454.json
new file mode 100644
index 00000000000..9f60fb24baa
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46454.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-46454",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T15:15:07.680",
+ "lastModified": "2023-12-12T15:52:06.410",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In GL.iNET GL-AR300M routers with firmware v4.3.7, it is possible to inject arbitrary shell commands through a crafted package name in the package information functionality."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://cyberaz0r.info/2023/11/glinet-multiple-vulnerabilities/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46455.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46455.json
new file mode 100644
index 00000000000..9eb7c985fdc
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46455.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46455",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T15:15:07.743",
+ "lastModified": "2023-12-12T15:52:06.410",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In GL.iNET GL-AR300M routers with firmware v4.3.7 it is possible to write arbitrary files through a path traversal attack in the OpenVPN client file upload functionality."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://cyberaz0r.info/2023/11/glinet-multiple-vulnerabilities/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.gl-inet.com/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46456.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46456.json
new file mode 100644
index 00000000000..7b551fcd63e
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46456.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46456",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T15:15:07.810",
+ "lastModified": "2023-12-12T15:52:06.410",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In GL.iNET GL-AR300M routers with firmware 3.216 it is possible to inject arbitrary shell commands through the OpenVPN client file upload functionality."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://cyberaz0r.info/2023/11/glinet-multiple-vulnerabilities/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.gl-inet.com/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46641.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46641.json
index e8ee929e9f4..a45dd5fa759 100644
--- a/CVE-2023/CVE-2023-466xx/CVE-2023-46641.json
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46641.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-46641",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-07T11:15:08.007",
- "lastModified": "2023-12-07T12:12:22.533",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:11:31.140",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -50,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:code4recovery:12_step_meeting_list:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "3.14.25",
+ "matchCriteriaId": "F150AB3C-2F40-4C2A-8ABF-6602DC34A83A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/12-step-meeting-list/wordpress-12-step-meeting-list-plugin-3-14-24-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46857.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46857.json
index 9ddd774d3f8..533774d1a8e 100644
--- a/CVE-2023/CVE-2023-468xx/CVE-2023-46857.json
+++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46857.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-46857",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T06:15:54.740",
- "lastModified": "2023-12-07T12:12:27.987",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:05:02.030",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,19 +14,81 @@
"value": "Squidex anterior a 7.9.0 permite XSS a trav\u00e9s de un documento SVG en la funci\u00f3n Cargar activos. Esto ocurre porque hay una lista negra incompleta en la inspecci\u00f3n SVG, lo que permite JavaScript en el atributo SRC de un elemento IFRAME. Se requiere un ataque autenticado con permiso assets.create para la explotaci\u00f3n."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:squidex.io:squidex:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "7.9.0",
+ "matchCriteriaId": "90B9B378-EEF4-47AD-8833-B2E33F566A76"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/11/08/4",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://census-labs.com/news/2023/11/08/weak-svg-asset-filtering-mechanism-in-squidex-cms/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit"
+ ]
},
{
"url": "https://support.squidex.io/c/news/9",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46916.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46916.json
index 62cb18bd88b..2939567b987 100644
--- a/CVE-2023/CVE-2023-469xx/CVE-2023-46916.json
+++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46916.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-46916",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T06:15:54.803",
- "lastModified": "2023-12-07T12:12:27.987",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:03:51.163",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,15 +14,87 @@
"value": "Los dispositivos Maxima Max Pro Power 1.0 486A permiten la reproducci\u00f3n del tr\u00e1fico BLE. Un atacante puede utilizar el identificador de caracter\u00edstica GATT 0x0012 para realizar acciones potencialmente disruptivas, como iniciar un monitor de frecuencia card\u00edaca."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:maximawatches:maxima_max_pro_power_firmware:1.0_486a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "715096FF-8DF3-4877-B4AE-073FA4F0D86A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:maximawatches:maxima_max_pro_power:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93F050F9-344A-4F7D-84D7-7964DF1886EF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://packetstormsecurity.com/files/175660",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://www.maximawatches.com/products/max-pro-power",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-474xx/CVE-2023-47440.json b/CVE-2023/CVE-2023-474xx/CVE-2023-47440.json
index 3fde3884892..011f763e64d 100644
--- a/CVE-2023/CVE-2023-474xx/CVE-2023-47440.json
+++ b/CVE-2023/CVE-2023-474xx/CVE-2023-47440.json
@@ -2,27 +2,93 @@
"id": "CVE-2023-47440",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T18:15:08.080",
- "lastModified": "2023-12-07T18:30:52.097",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T18:06:36.190",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Gladys Assistant v4.27.0 and prior is vulnerable to Directory Traversal. The patch of CVE-2023-43256 was found to be incomplete, allowing authenticated attackers to extract sensitive files in the host machine."
+ },
+ {
+ "lang": "es",
+ "value": "Gladys Assistant v4.27.0 y anteriores son vulnerables a Directory Traversal. Se descubri\u00f3 que el parche CVE-2023-43256 estaba incompleto, lo que permit\u00eda a atacantes autenticados extraer archivos confidenciales en la m\u00e1quina host."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gladysassistant:gladys_assistant:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "4.30.0",
+ "matchCriteriaId": "A084D786-016A-4500-B235-6E6E70C2D241"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://blog.moku.fr/cve/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://blog.moku.fr/cves/CVE-2023-47440/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/GladysAssistant/Gladys/pull/1918/commits/4f56ba250ff9f46578f1afa6a97e62e74bad83b7",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47779.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47779.json
index 3f7aa515eb1..124ec26ce13 100644
--- a/CVE-2023/CVE-2023-477xx/CVE-2023-47779.json
+++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47779.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-47779",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-07T12:15:07.820",
- "lastModified": "2023-12-07T16:09:27.937",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:53:31.067",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks. Integration for Constant Contact and Contact Form 7, WPForms, Elementor, Ninja Forms.This issue affects Integration for Constant Contact and Contact Form 7, WPForms, Elementor, Ninja Forms: from n/a through 1.1.4.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de redirecci\u00f3n de URL a un sitio que no es de confianza (\"Open Redirect\") en CRM Perks. Integraci\u00f3n para Constant Contact y Contact Form 7, WPForms, Elementor, Ninja Forms. Este problema afecta la integraci\u00f3n para Constant Contact y Contact Form 7, WPForms, Elementor, Ninja Forms: desde n/a hasta 1.1.4."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:crmperks:integration_for_constant_contact_and_contact_form_7\\,_wpforms\\,_elementor\\,_ninja:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.1.5",
+ "matchCriteriaId": "B8D9AA4A-1BCE-4E17-A7E0-1183AC913AF7"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cf7-constant-contact/wordpress-integration-for-contact-form-7-and-constant-contact-plugin-1-1-4-open-redirection-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-481xx/CVE-2023-48123.json b/CVE-2023/CVE-2023-481xx/CVE-2023-48123.json
index d3b74e83057..00b58df7be6 100644
--- a/CVE-2023/CVE-2023-481xx/CVE-2023-48123.json
+++ b/CVE-2023/CVE-2023-481xx/CVE-2023-48123.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-48123",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-06T20:15:07.240",
- "lastModified": "2023-12-07T12:12:36.717",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:11:35.730",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,19 +14,88 @@
"value": "Un problema en Netgate pfSense Plus v.23.05.1 y anteriores y pfSense CE v.2.7.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud manipulada al archivo packet_capture.php."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netgate:pfsense:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.7.0",
+ "matchCriteriaId": "B58A09CC-355B-49BD-908B-ED3058794307"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netgate:pfsense_plus:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.05.1",
+ "matchCriteriaId": "D1309A70-521F-4F6C-8BE7-AE9460C039A6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://docs.netgate.com/downloads/pfSense-SA-23_11.webgui.asc",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/pfsense/pfsense/commit/f72618c4abb61ea6346938d0c93df9078736b775",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://redmine.pfsense.org/issues/14809",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Issue Tracking",
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48227.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48227.json
new file mode 100644
index 00000000000..5f3ce453f7a
--- /dev/null
+++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48227.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-48227",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-12-12T17:15:08.143",
+ "lastModified": "2023-12-12T17:22:30.567",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Umbraco is an ASP.NET content management system (CMS). Starting in version 8.0.0 and prior to versions 8.18.10, 10.7.0, and 12.3.0, Backoffice users with send for approval permission but not publish permission are able to publish in some scenarios. Versions 8.18.10, 10.7.0, and 12.3.0 contains a patch for this issue. No known workarounds are available."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-863"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-335x-5wcm-8jv2",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48313.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48313.json
new file mode 100644
index 00000000000..fbe5e70c5a8
--- /dev/null
+++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48313.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-48313",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-12-12T18:15:22.933",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Umbraco is an ASP.NET content management system (CMS). Starting in 10.0.0 and prior to versions 10.8.1 and 12.3.4, Umbraco contains a cross-site scripting (XSS) vulnerability enabling attackers to bring malicious content into a website or application. Versions 10.8.1 and 12.3.4 contain a patch for this issue."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-v98m-398x-269r",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48325.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48325.json
index 8ee38af71ae..80a5bcc7dd8 100644
--- a/CVE-2023/CVE-2023-483xx/CVE-2023-48325.json
+++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48325.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-48325",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-07T12:15:08.020",
- "lastModified": "2023-12-07T16:09:27.937",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:53:19.390",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in PluginOps Landing Page Builder \u2013 Lead Page \u2013 Optin Page \u2013 Squeeze Page \u2013 WordPress Landing Pages.This issue affects Landing Page Builder \u2013 Lead Page \u2013 Optin Page \u2013 Squeeze Page \u2013 WordPress Landing Pages: from n/a through 1.5.1.5.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de redirecci\u00f3n de URL a un sitio que no es de confianza ('Open Redirect') en PluginOps Landing Page Builder \u2013 Lead Page \u2013 Optin Page \u2013 Squeeze Page \u2013 WordPress Landing Pages. Este problema afecta a anding Page Builder \u2013 Lead Page \u2013 Optin Page \u2013 Squeeze Page \u2013 WordPress Landing Pages: desde n/a hasta 1.5.1.5."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pluginops:landing_page_builder:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.5.1.6",
+ "matchCriteriaId": "2BDF2EFA-E566-412A-BD31-AFC6A730BFEC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/page-builder-add/wordpress-landing-page-builder-plugin-1-5-1-5-open-redirection-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-488xx/CVE-2023-48859.json b/CVE-2023/CVE-2023-488xx/CVE-2023-48859.json
index 82fd3ad47b6..3ff9a8ce4c8 100644
--- a/CVE-2023/CVE-2023-488xx/CVE-2023-48859.json
+++ b/CVE-2023/CVE-2023-488xx/CVE-2023-48859.json
@@ -2,19 +2,91 @@
"id": "CVE-2023-48859",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-06T15:15:06.967",
- "lastModified": "2023-12-06T18:49:19.267",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:47:30.293",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "TOTOLINK A3002RU version 2.0.0-B20190902.1958 has a post-authentication RCE due to incorrect access control, allows attackers to bypass front-end security restrictions and execute arbitrary code."
+ },
+ {
+ "lang": "es",
+ "value": "TOTOLINK A3002RU versi\u00f3n 2.0.0-B20190902.1958 tiene un RCE de autenticaci\u00f3n posterior debido a un control de acceso incorrecto, permite a los atacantes eludir las restricciones de seguridad del front-end y ejecutar c\u00f3digo arbitrario."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-863"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:a3002ru_firmware:2.0.0-b20190902.1958:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FF7809B-C61E-457D-8065-D91A55861D9A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "21945D3C-27AA-4614-8D5D-C22DE8C56F94"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/xieqiang11/security_research/blob/main/TOTOLINK-A3002RU-RCE.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-488xx/CVE-2023-48860.json b/CVE-2023/CVE-2023-488xx/CVE-2023-48860.json
index dfa6e957d6f..b93f74644f1 100644
--- a/CVE-2023/CVE-2023-488xx/CVE-2023-48860.json
+++ b/CVE-2023/CVE-2023-488xx/CVE-2023-48860.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-48860",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T08:15:07.213",
- "lastModified": "2023-12-07T12:12:22.533",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:02:54.853",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,79 @@
"value": "TOTOLINK N300RT versi\u00f3n 3.2.4-B20180730.0906 tiene un RCE de autenticaci\u00f3n posterior debido a un control de acceso incorrecto, lo que permite a los atacantes eludir las restricciones de seguridad del front-end y ejecutar c\u00f3digo arbitrario."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:n300rt_firmware:3.2.4-b20180730.0906:*:*:*:*:*:*:*",
+ "matchCriteriaId": "013A464E-33B9-4BA5-838D-92DE2897E951"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:n300rt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0581174-E6B1-4E3D-8384-7852EC53FC14"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/xieqiang11/security_research/blob/main/TOTOLINK-N300RT-RCE.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-489xx/CVE-2023-48928.json b/CVE-2023/CVE-2023-489xx/CVE-2023-48928.json
index 9c342e6d534..97f72fee982 100644
--- a/CVE-2023/CVE-2023-489xx/CVE-2023-48928.json
+++ b/CVE-2023/CVE-2023-489xx/CVE-2023-48928.json
@@ -2,19 +2,79 @@
"id": "CVE-2023-48928",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-08T05:15:08.807",
- "lastModified": "2023-12-08T14:23:10.393",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:12:37.883",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Franklin Fueling Systems System Sentinel AnyWare (SSA) version 1.6.24.492 is vulnerable to Open Redirect. The 'path' parameter of the prefs.asp resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL."
+ },
+ {
+ "lang": "es",
+ "value": "Franklin Fueling Systems System Sentinel AnyWare (SSA) versi\u00f3n 1.6.24.492 es vulnerable a Open Redirect. El par\u00e1metro 'ruta' del recurso prefs.asp permite a un atacante redirigir a un usuario v\u00edctima a un sitio web arbitrario utilizando una URL manipulada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-601"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:franklin-electric:system_sentinel_anyware:1.6.24.492:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BC15A75-BF6D-4F6D-A6E5-65B49968BA77"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/MatJosephs/CVEs/tree/main/CVE-2023-48928",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-489xx/CVE-2023-48929.json b/CVE-2023/CVE-2023-489xx/CVE-2023-48929.json
index 5f66e1a8cda..f21c398dbc6 100644
--- a/CVE-2023/CVE-2023-489xx/CVE-2023-48929.json
+++ b/CVE-2023/CVE-2023-489xx/CVE-2023-48929.json
@@ -2,19 +2,79 @@
"id": "CVE-2023-48929",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-08T05:15:08.897",
- "lastModified": "2023-12-08T14:23:10.393",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:12:58.153",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Franklin Fueling Systems System Sentinel AnyWare (SSA) version 1.6.24.492 is vulnerable to Session Fixation. The 'sid' parameter in the group_status.asp resource allows an attacker to escalate privileges and obtain sensitive information."
+ },
+ {
+ "lang": "es",
+ "value": "Franklin Fueling Systems System Sentinel AnyWare (SSA) versi\u00f3n 1.6.24.492 es vulnerable a la correcci\u00f3n de sesiones. El par\u00e1metro 'sid' en el recurso group_status.asp permite a un atacante escalar privilegios y obtener informaci\u00f3n confidencial."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-384"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:franklin-electric:system_sentinel_anyware:1.6.24.492:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BC15A75-BF6D-4F6D-A6E5-65B49968BA77"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/MatJosephs/CVEs/tree/main/CVE-2023-48929",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-490xx/CVE-2023-49007.json b/CVE-2023/CVE-2023-490xx/CVE-2023-49007.json
index 22f7515eed2..ad79b96a4aa 100644
--- a/CVE-2023/CVE-2023-490xx/CVE-2023-49007.json
+++ b/CVE-2023/CVE-2023-490xx/CVE-2023-49007.json
@@ -2,19 +2,92 @@
"id": "CVE-2023-49007",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-08T14:15:07.153",
- "lastModified": "2023-12-08T14:23:10.393",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:13:30.867",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In Netgear Orbi RBR750 firmware before V7.2.6.21, there is a stack-based buffer overflow in /usr/sbin/httpd."
+ },
+ {
+ "lang": "es",
+ "value": "En el firmware Netgear Orbi RBR750 anterior a V7.2.6.21, hay un desbordamiento del b\u00fafer basado en pila en /usr/sbin/httpd."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "7.2.6.21",
+ "matchCriteriaId": "0DB9D702-FD85-4DF2-8CC6-8C3291FD0ABE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C13F5C69-FA9B-472A-9036-0C2967BDCDE9"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/5erua/netgear_orbi_overflow_vulnerability/blob/main/README.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-490xx/CVE-2023-49096.json b/CVE-2023/CVE-2023-490xx/CVE-2023-49096.json
index b99f8a32931..520bc206b06 100644
--- a/CVE-2023/CVE-2023-490xx/CVE-2023-49096.json
+++ b/CVE-2023/CVE-2023-490xx/CVE-2023-49096.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49096",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-12-06T20:15:07.287",
- "lastModified": "2023-12-07T12:12:36.717",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:09:48.753",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -50,30 +70,68 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.8.13",
+ "matchCriteriaId": "93D6F598-55D9-4041-BED8-4448226B5EFF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://cwe.mitre.org/data/definitions/88.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Not Applicable"
+ ]
},
{
"url": "https://en.wikipedia.org/wiki/Pass_the_hash",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Not Applicable"
+ ]
},
{
"url": "https://ffmpeg.org/ffmpeg-filters.html#drawtext-1",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Not Applicable"
+ ]
},
{
"url": "https://github.com/jellyfin/jellyfin/commit/a656799dc879d16d21bf2ce7ad412ebd5d45394a",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/jellyfin/jellyfin/issues/5415",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/jellyfin/jellyfin/security/advisories/GHSA-866x-wj5j-2vf4",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49225.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49225.json
index cd375af50ee..33a6ca7e5d9 100644
--- a/CVE-2023/CVE-2023-492xx/CVE-2023-49225.json
+++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49225.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49225",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-12-07T07:15:12.880",
- "lastModified": "2023-12-07T12:12:22.533",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:04:37.617",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,15 +14,1123 @@
"value": "Existe una vulnerabilidad de Cross-Site-Scripting en los productos Ruckus Access Point (ZoneDirector, SmartZone y AP Solo). Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en el navegador web del usuario que inicia sesi\u00f3n en el producto. En cuanto a los productos/modelos/versiones afectados, consulte la informaci\u00f3n proporcionada por el proveedor que figura en la secci\u00f3n [Referencias] o la lista en la secci\u00f3n [Estado del producto]."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:r750_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "19637FB4-A1EC-4DDB-9FD2-B176427B9933"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA49CB45-1196-4AD7-8AB6-C5593BBF015F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:r650_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "2F805AE7-830E-4D88-AA80-40FEC783AC84"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:r650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "951BDA12-0294-472A-9292-F60AC6D4292B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:r730_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "4F98CC2D-247B-493F-A1DD-8133622C2AE7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:r730:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB28A5E0-6F42-4133-B1D3-1D0116079094"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:t750_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "DFCDC4FB-7448-4E19-AF4D-897180F3775B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:t750:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C15AA25-82B2-4C02-8361-E8F6179B525A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:r510_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "5D6269F0-AFA6-48A9-92D2-3A3250B1E6C0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:e510_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "2D2FB77C-1E97-44C5-A961-7F91B1A8AB34"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FBF5C92C-C889-4732-BB00-E6D55613E410"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:c110_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "6531A85F-9AA8-4A26-9A81-09003B8AAF2E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A77671DB-6197-4C8D-B667-A0081350E5AF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:r320_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "7C00DA68-6EA2-4D88-B60C-6980D4953912"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93CE3224-85D2-4039-8F24-BB503DFD42C2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:h510_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "843E61F5-DE53-47B3-BF24-B817BE9F334E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:h320_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "F625B309-F3BC-4899-B6B4-C460B7502730"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:t305_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "2ED5CB06-9A07-4EF6-B730-7D24B8E131F7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:t305:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0500E6E8-D56C-41EC-B9C5-72C5DD955639"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:m510_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "3EB3F18F-04F1-4D37-A74C-B12ED64ECDEE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D4AE7200-4090-4B81-A22F-B8553A014D21"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:r720_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "73590841-C0E4-423B-89F3-C5E3E5DC3A84"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:r710_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "CD213C0E-8D62-43C1-AAAD-72AB2455F4C8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:t710_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "1AC75B29-992F-4917-B0A9-6B4C16905E3A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A40B9489-D999-4355-953E-36A7F8DEF299"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:t610_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "0273FF13-6329-4A68-B2B1-674D0FDCEACC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:r610_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "7CA61CD3-AFD8-4C9B-B707-850A352EFF63"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4244947C-538E-4B83-B4F4-3DD4F3C22E83"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:t310d_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "3D3D9629-CDD0-497E-A798-BD68696D7B0A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2D3E8C6-4676-4B74-A252-132A26670C64"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:t310s_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "47656F30-691A-4072-B5DF-0B4026133B24"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72378D4B-ADB5-4DE5-BB92-1778BDFD61FC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:t310n_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "8508F154-5538-401A-8A1E-192C38A482B4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2ED4C9B4-7F70-4059-8592-FD3F034160C3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:t310c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "D50969FD-837B-49B3-820E-E02CA9CD75E3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:t710s_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "11907B93-2CC9-43E7-98E9-B13370225009"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4CFF0772-D853-4781-B326-E3BDEAC78EE0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:t610s_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.6565",
+ "matchCriteriaId": "A6B8C9F8-76A1-4B8C-8FB9-770CB0E7DC94"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:t610s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "752CBB38-F5C6-4666-B062-B5E3B15CA1A0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:r550_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.5585",
+ "matchCriteriaId": "260442D7-362E-4141-BE55-066154A5B587"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:r550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "215024F9-C68E-4919-9FD5-215CF900A830"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:r850_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.5585",
+ "matchCriteriaId": "392561BB-1413-44A3-B4D1-CC4A57DC67F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:r850:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3A244DE5-A9B3-45BE-8AD1-154546F4F1F4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:t750se_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "114.0.0.0.5585",
+ "matchCriteriaId": "0F079E97-F62E-4919-A21B-1443146FEB14"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:t750se:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9E1DE3AD-CA13-44CE-ACF1-3DE2D6C691BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "110.0.0.0.2014",
+ "matchCriteriaId": "0F6AF187-4EC5-4F8A-9FB3-E1FD4F71FA4F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:r310:*:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93655935-481F-477B-A0C3-EFFFB822C9D5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "118.1.0.0.1274",
+ "matchCriteriaId": "22D73A1E-302B-4494-B0CF-48D298A25916"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*",
+ "matchCriteriaId": "700D0FAA-0964-486A-932B-08CF1A328468"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "118.1.0.0.1274",
+ "matchCriteriaId": "22D73A1E-302B-4494-B0CF-48D298A25916"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*",
+ "matchCriteriaId": "700D0FAA-0964-486A-932B-08CF1A328468"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:r560_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "118.1.0.0.1908",
+ "matchCriteriaId": "1BEFF83F-4F8E-4BFE-B964-2F019A846EF0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:r560:*:*:*:*:*:*:*:*",
+ "matchCriteriaId": "75E00EC7-030F-4E90-8747-4AA87C2DA73D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:h550_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "116.0.0.0.1506",
+ "matchCriteriaId": "DFDDACE4-B572-4E7F-8D7C-333B3108D0F8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:h550:*:*:*:*:*:*:*:*",
+ "matchCriteriaId": "843E2FCE-C3EC-406A-8ECB-BA5F51C2DCFF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:h350_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "116.0.0.0.3128",
+ "matchCriteriaId": "F1056C4F-1A29-474A-AD6F-6911F68ED36E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:h350:*:*:*:*:*:*:*:*",
+ "matchCriteriaId": "389825B3-BD3F-48F9-A6EB-238D1485E24D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:t350c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "116.0.0.0.1543",
+ "matchCriteriaId": "561DDAE6-C5A0-4DA8-AC07-0EF7D06A8848"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:t350c:*:*:*:*:*:*:*:*",
+ "matchCriteriaId": "663BF055-A677-418A-8009-599D7BE04221"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:t350d_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "116.0.0.0.1543",
+ "matchCriteriaId": "C77FF583-1BAF-4042-A5F0-07DF1FC4C5E4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:t350d:*:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4323CCB1-EE5E-498F-86F3-00CE6C75F10D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:t350se_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "116.0.0.0.3136",
+ "matchCriteriaId": "BCC95847-0984-466D-9227-5A44971260F2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:t350se:*:*:*:*:*:*:*:*",
+ "matchCriteriaId": "60A48D4A-75D9-486B-896D-7BF11AD3ED6B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:r350_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "116.0.0.0.1655",
+ "matchCriteriaId": "004DED59-2353-40D5-997A-E021728E4F23"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:r350:*:*:*:*:*:*:*:*",
+ "matchCriteriaId": "34B3B5B6-3365-47B2-847E-004489533CDA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:smartzone_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "6.1.1",
+ "matchCriteriaId": "6E0D700D-F65B-49CC-BA09-41B22A6884C1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:smartzone:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "488EBBAE-099D-4448-AAE6-823C448C4DD6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "10.5.1",
+ "matchCriteriaId": "E1DA133A-1251-4946-BC27-FECABFEA056A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:ruckuswireless:zonedirector:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BC847897-E9C7-4247-BC22-E999847E1110"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN45891816/",
- "source": "vultures@jpcert.or.jp"
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.ruckuswireless.com/security_bulletins/323",
- "source": "vultures@jpcert.or.jp"
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49243.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49243.json
index ddc1665a8eb..e9f39bad1b6 100644
--- a/CVE-2023/CVE-2023-492xx/CVE-2023-49243.json
+++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49243.json
@@ -2,23 +2,130 @@
"id": "CVE-2023-49243",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-12-06T09:15:08.497",
- "lastModified": "2023-12-06T13:50:00.573",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:07:03.270",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of unauthorized access to email attachments in the email module. Successful exploitation of this vulnerability may affect service confidentiality."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de acceso no autorizado a archivos adjuntos de correo electr\u00f3nico en el m\u00f3dulo de correo electr\u00f3nico. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "511F8CE2-C2B6-4A08-B992-49D9B75B8655"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2023/12/",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49244.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49244.json
index 4895bda270f..45aa3bc8931 100644
--- a/CVE-2023/CVE-2023-492xx/CVE-2023-49244.json
+++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49244.json
@@ -2,23 +2,115 @@
"id": "CVE-2023-49244",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-12-06T09:15:08.543",
- "lastModified": "2023-12-06T13:50:00.573",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T15:42:53.687",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Permission management vulnerability in the multi-user module. Successful exploitation of this vulnerability may affect service confidentiality."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de gesti\u00f3n de permisos en el m\u00f3dulo multiusuario. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2023/12/",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49245.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49245.json
index e4ed2ff7c11..f2c0ffd2d73 100644
--- a/CVE-2023/CVE-2023-492xx/CVE-2023-49245.json
+++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49245.json
@@ -2,23 +2,130 @@
"id": "CVE-2023-49245",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-12-06T09:15:08.590",
- "lastModified": "2023-12-06T13:50:00.573",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:03:00.227",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Unauthorized access vulnerability in the Huawei Share module. Successful exploitation of this vulnerability may affect service confidentiality."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de acceso no autorizado en el m\u00f3dulo Huawei Share. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "511F8CE2-C2B6-4A08-B992-49D9B75B8655"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2023/12/",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49246.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49246.json
index 77537c58468..8f99580ff09 100644
--- a/CVE-2023/CVE-2023-492xx/CVE-2023-49246.json
+++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49246.json
@@ -2,23 +2,125 @@
"id": "CVE-2023-49246",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-12-06T09:15:08.633",
- "lastModified": "2023-12-06T13:50:00.573",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:04:15.010",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de acceso no autorizado en el m\u00f3dulo de gesti\u00f3n de tarjetas. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "511F8CE2-C2B6-4A08-B992-49D9B75B8655"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2023/12/",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49247.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49247.json
index d6cc33d60da..17efea0171d 100644
--- a/CVE-2023/CVE-2023-492xx/CVE-2023-49247.json
+++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49247.json
@@ -2,16 +2,53 @@
"id": "CVE-2023-49247",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-12-06T09:15:08.680",
- "lastModified": "2023-12-06T13:50:00.573",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:19:24.277",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Permission verification vulnerability in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de verificaci\u00f3n de permisos en escenarios distribuidos. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-295"
+ }
+ ]
+ },
{
"source": "psirt@huawei.com",
"type": "Secondary",
@@ -23,14 +60,67 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2023/12/",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49248.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49248.json
index 3c23574425f..d68691122a7 100644
--- a/CVE-2023/CVE-2023-492xx/CVE-2023-49248.json
+++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49248.json
@@ -2,16 +2,53 @@
"id": "CVE-2023-49248",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-12-06T09:15:08.780",
- "lastModified": "2023-12-06T13:50:00.573",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T15:29:11.907",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of unauthorized file access in the Settings app. Successful exploitation of this vulnerability may cause unauthorized file access."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de acceso no autorizado a archivos en la aplicaci\u00f3n Configuraci\u00f3n. La explotaci\u00f3n exitosa de esta vulnerabilidad puede causar acceso no autorizado a archivos."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ },
{
"source": "psirt@huawei.com",
"type": "Secondary",
@@ -23,14 +60,72 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "511F8CE2-C2B6-4A08-B992-49D9B75B8655"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2023/12/",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-494xx/CVE-2023-49485.json b/CVE-2023/CVE-2023-494xx/CVE-2023-49485.json
index 37609d3c3fa..362b0946474 100644
--- a/CVE-2023/CVE-2023-494xx/CVE-2023-49485.json
+++ b/CVE-2023/CVE-2023-494xx/CVE-2023-49485.json
@@ -2,19 +2,78 @@
"id": "CVE-2023-49485",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-08T15:15:07.893",
- "lastModified": "2023-12-08T16:37:45.763",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:19:56.587",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "JFinalCMS v5.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the column management department."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que JFinalCMS v5.0.0 conten\u00eda una vulnerabilidad de Cross-Site Scripting (XSS) en el departamento de administraci\u00f3n de columnas."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jfinalcms_project:jfinalcms:5.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0813B8F4-66B1-42C6-83A7-831B13233428"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Rabb1ter/cms/blob/main/There%20is%20a%20storage%20type%20XSS%20in%20the%20column%20management%20department.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-494xx/CVE-2023-49486.json b/CVE-2023/CVE-2023-494xx/CVE-2023-49486.json
index 6a7e749314f..c1bf6afb8de 100644
--- a/CVE-2023/CVE-2023-494xx/CVE-2023-49486.json
+++ b/CVE-2023/CVE-2023-494xx/CVE-2023-49486.json
@@ -2,19 +2,78 @@
"id": "CVE-2023-49486",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-08T15:15:07.943",
- "lastModified": "2023-12-08T16:37:45.763",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:19:42.290",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "JFinalCMS v5.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the model management department."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que JFinalCMS v5.0.0 conten\u00eda una vulnerabilidad de Cross-Site Scripting (XSS) en el departamento de gesti\u00f3n de modelos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jfinalcms_project:jfinalcms:5.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0813B8F4-66B1-42C6-83A7-831B13233428"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Rabb1ter/cms/blob/main/There%20is%20a%20stored%20XSS%20in%20the%20model%20management%20department.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-494xx/CVE-2023-49487.json b/CVE-2023/CVE-2023-494xx/CVE-2023-49487.json
index 158ccbd18ba..98ebbf4385b 100644
--- a/CVE-2023/CVE-2023-494xx/CVE-2023-49487.json
+++ b/CVE-2023/CVE-2023-494xx/CVE-2023-49487.json
@@ -2,19 +2,78 @@
"id": "CVE-2023-49487",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-08T15:15:07.990",
- "lastModified": "2023-12-08T16:37:45.763",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:19:08.283",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "JFinalCMS v5.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the navigation management department."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que JFinalCMS v5.0.0 conten\u00eda una vulnerabilidad de Cross-Site Scripting (XSS) en el departamento de gesti\u00f3n de navegaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jfinalcms_project:jfinalcms:5.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0813B8F4-66B1-42C6-83A7-831B13233428"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Rabb1ter/cms/blob/main/There%20is%20a%20stored%20XSS%20in%20the%20navigation%20management%20office.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-494xx/CVE-2023-49492.json b/CVE-2023/CVE-2023-494xx/CVE-2023-49492.json
index 4c681eb27ec..64f61f35e39 100644
--- a/CVE-2023/CVE-2023-494xx/CVE-2023-49492.json
+++ b/CVE-2023/CVE-2023-494xx/CVE-2023-49492.json
@@ -2,19 +2,80 @@
"id": "CVE-2023-49492",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T16:15:07.587",
- "lastModified": "2023-12-07T17:36:41.553",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T18:21:17.307",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "DedeCMS v5.7.111 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the imgstick parameter at selectimages.php."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que DedeCMS v5.7.111 contiene una vulnerabilidad Cross-Site Scripting (XSS) Reflectante a trav\u00e9s del par\u00e1metro imgstick en selectimages.php."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dedecms:dedecms:5.7.111:*:*:*:*:*:*:*",
+ "matchCriteriaId": "377F392A-A04B-4E7A-BBE8-F77CE65BDFCF"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Hebing123/cve/issues/2",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-494xx/CVE-2023-49493.json b/CVE-2023/CVE-2023-494xx/CVE-2023-49493.json
index 0fc42f66f1f..770584022e9 100644
--- a/CVE-2023/CVE-2023-494xx/CVE-2023-49493.json
+++ b/CVE-2023/CVE-2023-494xx/CVE-2023-49493.json
@@ -2,19 +2,80 @@
"id": "CVE-2023-49493",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T16:15:07.633",
- "lastModified": "2023-12-07T17:36:41.553",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T18:23:26.673",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "DedeCMS v5.7.111 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the v parameter at selectimages.php."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que DedeCMS v5.7.111 contiene una vulnerabilidad de Cross-Site Scripting (XSS) Reflectante a trav\u00e9s del par\u00e1metro v en selectimages.php."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dedecms:dedecms:5.7.111:*:*:*:*:*:*:*",
+ "matchCriteriaId": "377F392A-A04B-4E7A-BBE8-F77CE65BDFCF"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Hebing123/cve/issues/2",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49746.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49746.json
index a24d24a7ca7..66b1fd82290 100644
--- a/CVE-2023/CVE-2023-497xx/CVE-2023-49746.json
+++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49746.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49746",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-07T11:15:08.200",
- "lastModified": "2023-12-07T12:12:22.533",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:56:40.860",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -50,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softaculous:speedycache:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.1.3",
+ "matchCriteriaId": "8B9674E6-A715-408F-B3A9-644B2117EDF5"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/speedycache/wordpress-speedycache-plugin-1-1-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49923.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49923.json
new file mode 100644
index 00000000000..f6a6f752a35
--- /dev/null
+++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49923.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-49923",
+ "sourceIdentifier": "bressers@elastic.co",
+ "published": "2023-12-12T18:15:23.153",
+ "lastModified": "2023-12-12T18:58:37.987",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": " An issue was discovered by Elastic whereby the Documents API of App Search logged the raw contents of indexed documents at INFO log level. Depending on the contents of such documents, this could lead to the insertion of sensitive or private information in the App Search logs. Elastic has released 8.11.2 and 7.17.16 that resolves this issue by changing the log level at which these are logged to DEBUG, which is disabled by default."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-532"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://discuss.elastic.co/t/enterprise-search-8-11-2-7-17-16-security-update-esa-2023-31/349181",
+ "source": "bressers@elastic.co"
+ },
+ {
+ "url": "https://www.elastic.co/community/security",
+ "source": "bressers@elastic.co"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49990.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49990.json
index 72350fff9e6..179869cbe5d 100644
--- a/CVE-2023/CVE-2023-499xx/CVE-2023-49990.json
+++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49990.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49990",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-12T14:15:07.553",
- "lastModified": "2023-12-12T14:15:07.553",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-12T15:52:06.410",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49991.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49991.json
index 682f5cc4c96..b3c08d2ead9 100644
--- a/CVE-2023/CVE-2023-499xx/CVE-2023-49991.json
+++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49991.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49991",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-12T14:15:07.600",
- "lastModified": "2023-12-12T14:15:07.600",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-12T15:52:06.410",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49992.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49992.json
index 81023136be1..d8fc1a9e3f4 100644
--- a/CVE-2023/CVE-2023-499xx/CVE-2023-49992.json
+++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49992.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49992",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-12T14:15:07.653",
- "lastModified": "2023-12-12T14:15:07.653",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-12T15:52:06.410",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49993.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49993.json
index a370d59f92d..99bad34a585 100644
--- a/CVE-2023/CVE-2023-499xx/CVE-2023-49993.json
+++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49993.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49993",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-12T14:15:07.700",
- "lastModified": "2023-12-12T14:15:07.700",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-12T15:52:06.410",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49994.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49994.json
index aff86710653..9fe14491db1 100644
--- a/CVE-2023/CVE-2023-499xx/CVE-2023-49994.json
+++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49994.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49994",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-12T14:15:07.750",
- "lastModified": "2023-12-12T14:15:07.750",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-12T15:52:06.410",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50164.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50164.json
index c6223dd6b43..8cc7c7f1c5b 100644
--- a/CVE-2023/CVE-2023-501xx/CVE-2023-50164.json
+++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50164.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-50164",
"sourceIdentifier": "security@apache.org",
"published": "2023-12-07T09:15:07.060",
- "lastModified": "2023-12-07T21:15:08.017",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:01:42.177",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "Un atacante puede manipular los par\u00e1metros de carga de archivos para permitir path traversal y, en algunas circunstancias, esto puede provocar la carga de un archivo malicioso que puede usarse para realizar la ejecuci\u00f3n remota de c\u00f3digo. Se recomienda a los usuarios actualizar a las versiones Struts 2.5.33 o Struts 6.3.0.1 o superior para solucionar este problema."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
"weaknesses": [
{
"source": "security@apache.org",
@@ -27,14 +50,47 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.0.0",
+ "versionEndExcluding": "2.5.33",
+ "matchCriteriaId": "BE174994-63BE-4A3F-A986-7903868FCE23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.0.0",
+ "versionEndExcluding": "6.3.0.2",
+ "matchCriteriaId": "DBE0443B-320B-4C29-83DC-624546AEE6D5"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List",
+ "Patch"
+ ]
},
{
"url": "https://www.openwall.com/lists/oss-security/2023/12/07/1",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50495.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50495.json
new file mode 100644
index 00000000000..eec4a8d7b8a
--- /dev/null
+++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50495.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-50495",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-12-12T15:15:07.867",
+ "lastModified": "2023-12-12T15:52:06.410",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry()."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5557.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5557.json
index 01c20390493..67543e0ccfd 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5557.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5557.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5557",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-10-13T02:15:11.077",
- "lastModified": "2023-12-12T10:15:11.207",
+ "lastModified": "2023-12-12T16:15:08.150",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -152,6 +152,22 @@
"url": "https://access.redhat.com/errata/RHSA-2023:7730",
"source": "secalert@redhat.com"
},
+ {
+ "url": "https://access.redhat.com/errata/RHSA-2023:7731",
+ "source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://access.redhat.com/errata/RHSA-2023:7732",
+ "source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://access.redhat.com/errata/RHSA-2023:7733",
+ "source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://access.redhat.com/errata/RHSA-2023:7739",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://access.redhat.com/security/cve/CVE-2023-5557",
"source": "secalert@redhat.com",
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5761.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5761.json
index fa89e7ae1d1..737393d49ae 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5761.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5761.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5761",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-12-07T02:15:07.450",
- "lastModified": "2023-12-07T12:12:36.717",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T15:50:05.353",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "security@wordfence.com",
"type": "Secondary",
@@ -38,14 +58,58 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:burst-statistics:burst_statistics:*:*:*:*:*:wordpress:*:*",
+ "versionStartIncluding": "1.4.0",
+ "versionEndExcluding": "1.5.0",
+ "matchCriteriaId": "40FF62C0-CD72-40A7-AFFB-94788EFEFDED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:burst-statistics:burst_statistics:*:*:*:*:pro:wordpress:*:*",
+ "versionStartIncluding": "1.4.0",
+ "versionEndExcluding": "1.5.1",
+ "matchCriteriaId": "8581ADCC-2358-4B2F-9598-1A5F8E1C074A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2976467%40burst-statistics&new=2976467%40burst-statistics&sfp_email=&sfph_mail=",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/30f8419c-c7b9-4c68-a845-26c0308d76f3?source=cve",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5808.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5808.json
index 531aeafece7..27f963645ac 100644
--- a/CVE-2023/CVE-2023-58xx/CVE-2023-5808.json
+++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5808.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5808",
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
"published": "2023-12-05T00:15:09.840",
- "lastModified": "2023-12-11T18:15:30.130",
+ "lastModified": "2023-12-12T17:15:08.400",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -112,7 +112,7 @@
],
"references": [
{
- "url": "https://knowledge.hitachivantara.com/Security/System_Management_Unit_(SMU)_versions_prior_to_14.8.7825.01%2C_used_to_manage_Hitachi_Vantara_NAS_products_are_susceptible_to_unintended_information_disclosure_via_unprivileged_access_to_HNAS_configuration_backup_and_diagnostic_data",
+ "url": "https://knowledge.hitachivantara.com/Security/System_Management_Unit_(SMU)_versions_prior_to_14.8.7825.01%2C_used_to_manage_Hitachi_Vantara_NAS_products_are_susceptible_to_unintended_information_disclosure_via_unprivileged_access_to_HNAS_configuration_backup_and_diagnostic_data.",
"source": "security.vulnerabilities@hitachivantara.com"
}
]
diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6146.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6146.json
index dc0ee7dc306..d78dbccbfc2 100644
--- a/CVE-2023/CVE-2023-61xx/CVE-2023-6146.json
+++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6146.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-6146",
"sourceIdentifier": "bugreport@qualys.com",
"published": "2023-12-08T15:15:08.037",
- "lastModified": "2023-12-08T16:37:45.763",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:20:59.940",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nA Qualys web application was found to have a stored XSS vulnerability resulting from the absence of HTML encoding in the presentation of logging information to users. This vulnerability allowed a user with login access to the application to introduce XSS payload via browser details.\u00a0\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que una aplicaci\u00f3n web Qualys ten\u00eda una vulnerabilidad XSS almacenada resultante de la ausencia de codificaci\u00f3n HTML en la presentaci\u00f3n de la informaci\u00f3n de registro a los usuarios. Esta vulnerabilidad permiti\u00f3 a un usuario con acceso a la aplicaci\u00f3n introducir el payload XSS a trav\u00e9s de los detalles del navegador."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "bugreport@qualys.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
{
"source": "bugreport@qualys.com",
"type": "Secondary",
@@ -46,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:qualys:private_cloud_platform:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.24.0.0",
+ "matchCriteriaId": "8592CBEB-FE44-4413-BC06-182BC622C87C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qualys.com/security-advisories/",
- "source": "bugreport@qualys.com"
+ "source": "bugreport@qualys.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6180.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6180.json
index f10dbb29af9..a2f2c07fd38 100644
--- a/CVE-2023/CVE-2023-61xx/CVE-2023-6180.json
+++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6180.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-6180",
"sourceIdentifier": "cna@cloudflare.com",
"published": "2023-12-05T15:15:08.703",
- "lastModified": "2023-12-05T15:27:51.100",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T15:49:29.317",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The tokio-boring library in version 4.0.0 is affected by a memory leak issue that can lead to excessive resource consumption and potential DoS by resource exhaustion. The set_ex_data function used by the library did not deallocate memory used by pre-existing data in memory each time after completing a TLS connection causing the program to consume more resources with each new connection.\n"
+ },
+ {
+ "lang": "es",
+ "value": "La librer\u00eda tokio-boring en la versi\u00f3n 4.0.0 se ve afectada por un problema de p\u00e9rdida de memoria que puede provocar un consumo excesivo de recursos y una posible DoS por agotamiento de los recursos. La funci\u00f3n set_ex_data utilizada por la librer\u00eda no desasign\u00f3 la memoria utilizada por los datos preexistentes en la memoria cada vez que se complet\u00f3 una conexi\u00f3n TLS, lo que provoc\u00f3 que el programa consumiera m\u00e1s recursos con cada nueva conexi\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "cna@cloudflare.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-401"
+ }
+ ]
+ },
{
"source": "cna@cloudflare.com",
"type": "Secondary",
@@ -50,10 +84,30 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cloudflare:boring:4.0.0:*:*:*:*:rust:*:*",
+ "matchCriteriaId": "FE7E647F-7BD0-4C49-BF61-E39D8B8B318D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/cloudflare/boring/security/advisories/GHSA-pjrj-h4fg-6gm4",
- "source": "cna@cloudflare.com"
+ "source": "cna@cloudflare.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6193.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6193.json
index 56151cdd643..09bd8bb79b7 100644
--- a/CVE-2023/CVE-2023-61xx/CVE-2023-6193.json
+++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6193.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6193",
"sourceIdentifier": "cna@cloudflare.com",
"published": "2023-12-12T14:15:07.797",
- "lastModified": "2023-12-12T14:15:07.797",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-12T15:52:06.410",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6273.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6273.json
index 085fe60a28c..5194a24b532 100644
--- a/CVE-2023/CVE-2023-62xx/CVE-2023-6273.json
+++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6273.json
@@ -2,23 +2,120 @@
"id": "CVE-2023-6273",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-12-06T09:15:08.857",
- "lastModified": "2023-12-06T13:50:00.573",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T18:36:55.433",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Permission management vulnerability in the module for disabling Sound Booster. Successful exploitation of this vulnerability may cause features to perform abnormally."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de gesti\u00f3n de permisos en el m\u00f3dulo para deshabilitar Sound Booster. La explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar que las funciones funcionen de manera anormal."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "511F8CE2-C2B6-4A08-B992-49D9B75B8655"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2023/12/",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json
index 137fe43591c..a15043f14c5 100644
--- a/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json
+++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-6275",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-24T15:15:07.783",
- "lastModified": "2023-12-04T15:10:22.267",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-12-12T18:15:23.363",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input \"> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246104. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
+ "value": "A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input \"> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-246104. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6288.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6288.json
index 93784eeec62..b292d8aab5c 100644
--- a/CVE-2023/CVE-2023-62xx/CVE-2023-6288.json
+++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6288.json
@@ -2,19 +2,91 @@
"id": "CVE-2023-6288",
"sourceIdentifier": "security@devolutions.net",
"published": "2023-12-06T14:15:07.677",
- "lastModified": "2023-12-06T18:49:19.267",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:52:48.990",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Code injection in Remote Desktop Manager 2023.3.9.3 and earlier on macOS allows an attacker to execute code via the DYLIB_INSERT_LIBRARIES environment variable.\n\n\n\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n de c\u00f3digo en Remote Desktop Manager 2023.3.9.3 y versiones anteriores en macOS permite a un atacante ejecutar c\u00f3digo a trav\u00e9s de la variable de entorno DYLIB_INSERT_LIBRARIES."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-94"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.3.10.2",
+ "matchCriteriaId": "185C0BDD-A18F-4AA6-8137-5F554EF53929"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2023-0021/",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6393.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6393.json
index fbd6b77c6bd..902dd676e57 100644
--- a/CVE-2023/CVE-2023-63xx/CVE-2023-6393.json
+++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6393.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-6393",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-12-06T17:15:07.377",
- "lastModified": "2023-12-06T18:49:19.267",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T16:26:59.963",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the Quarkus Cache Runtime. When request processing utilizes a Uni cached using @CacheResult and the cached Uni reuses the initial \"completion\" context, the processing switches to the cached Uni instead of the request context. This is a problem if the cached Uni context contains sensitive information, and could allow a malicious user to benefit from a POST request returning the response that is meant for another user, gaining access to sensitive data."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una falla en Quarkus Cache Runtime. Cuando el procesamiento de solicitudes utiliza una Uni almacenada en cach\u00e9 usando @CacheResult y la Uni almacenada en cach\u00e9 reutiliza el contexto de \"completion\" inicial, el procesamiento cambia a la Uni almacenada en cach\u00e9 en lugar del contexto de solicitud. Esto es un problema si el contexto Uni almacenado en cach\u00e9 contiene informaci\u00f3n confidencial y podr\u00eda permitir que un usuario malintencionado se beneficie de una solicitud POST que devuelva la respuesta destinada a otro usuario, obteniendo acceso a datos confidenciales."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 3.6
+ },
{
"source": "secalert@redhat.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "secalert@redhat.com",
"type": "Secondary",
@@ -46,14 +80,38 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE29B9D6-63DC-4779-ACE8-4E51E6A0AF37"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-6393",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253113",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Issue Tracking",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6448.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6448.json
index 3c58246d541..b478e7e4417 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6448.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6448.json
@@ -2,16 +2,44 @@
"id": "CVE-2023-6448",
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2023-12-05T18:15:12.643",
- "lastModified": "2023-12-05T20:13:47.300",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T15:31:22.767",
+ "vulnStatus": "Analyzed",
+ "cisaExploitAdd": "2023-12-11",
+ "cisaActionDue": "2023-12-18",
+ "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
+ "cisaVulnerabilityName": "Unitronics Vision PLC and HMI Insecure Default Password Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "Unitronics Vision Series PLCs and HMIs use default administrative passwords. An unauthenticated attacker with network access to a PLC or HMI can take administrative control of the system.\n"
+ },
+ {
+ "lang": "es",
+ "value": "Los PLC y HMI de Unitronics Vision Series utilizan contrase\u00f1as administrativas predeterminadas. Un atacante no autenticado con acceso a la red de un PLC o HMI puede tomar el control administrativo del sistema."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"type": "Secondary",
@@ -35,6 +63,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-798"
+ }
+ ]
+ },
{
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"type": "Secondary",
@@ -46,10 +84,367 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:unitronics:vision1210_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "77C7A79D-4EFE-41C2-88E9-F9A1A65C4D6E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:unitronics:vision1210:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "32D6EFD3-61C3-4C4D-8B17-16591255EAE5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:unitronics:vision1040_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "48A0D42D-7A8D-457F-A5CD-86B51893F692"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:unitronics:vision1040:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C91F4803-BC61-491F-9561-ECF043253B04"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:unitronics:vision700_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AB10EB4D-BDBE-47FF-9F10-60B5CB35D900"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:unitronics:vision700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "38C892EC-1980-459E-9B1F-E9F0C703E758"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:unitronics:vision570_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "13F59B69-E4F7-44D5-8B98-953DCAE8DA4C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:unitronics:vision570:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "017A743B-AB98-4931-B7D6-F1062529B947"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:unitronics:vision560_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "277889A8-0A02-4623-ABB6-02EEBAD2C444"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:unitronics:vision560:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3E24B3A0-2FD9-4C13-9E89-F218B9CCED7C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:unitronics:vision430_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "426B5B56-9B45-4B35-AE11-5BFE105A442F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:unitronics:vision430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A078DEE-DB79-4E33-BF48-849D6A26F0FC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:unitronics:vision350_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9BE0058F-1D67-4911-8851-5C1A2DD37028"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:unitronics:vision350:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "406D6FA9-4C05-4612-811E-A32E4516EBC1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:unitronics:vision130_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AD5FEF72-265B-49A4-96F2-C92AEC8CA4D4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:unitronics:vision130:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "49A6FC0D-8687-4563-9C38-5AF0DCC46926"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:unitronics:vision230_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "96B4A225-6384-4C80-B3F5-441095EB8D01"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:unitronics:vision230:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C360B7F4-9FDB-4143-87A0-1006C7C3A39C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:unitronics:vision280_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0DAF7F8-CAF7-4C94-BE4A-680FDA6A7700"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:unitronics:vision280:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "519F0192-4F48-4954-BAE1-8DC74BC0C017"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:unitronics:vision290_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2C25C3B0-0521-433C-B63A-39021BDCE9A1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:unitronics:vision290:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66A05131-B264-4858-A533-CBA5E229D40D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:unitronics:vision530_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1B9FC8CD-6413-42C6-9A36-B3BE5DB7F044"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:unitronics:vision530:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7A2DAADD-AD0E-43C5-B3CB-2F5445235C4F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:unitronics:vision120_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8B42157C-52B2-4CBA-8946-DF74517CE9CC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:unitronics:vision120:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CF245A2D-9C93-41C2-AD88-8B2ABA026D5B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems",
- "source": "9119a7d8-5eab-497f-8521-727c672e3725"
+ "source": "9119a7d8-5eab-497f-8521-727c672e3725",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6538.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6538.json
index dc2679f3e41..93b5fa62a13 100644
--- a/CVE-2023/CVE-2023-65xx/CVE-2023-6538.json
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6538.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-6538",
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
"published": "2023-12-11T18:15:30.250",
- "lastModified": "2023-12-12T13:43:48.853",
+ "lastModified": "2023-12-12T17:15:08.493",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@@ -52,7 +52,7 @@
],
"references": [
{
- "url": "https://knowledge.hitachivantara.com/Security/System_Management_Unit_(SMU)_versions_prior_to_14.8.7825.01%2C_used_to_manage_Hitachi_Vantara_NAS_products_is_susceptible_to_unintended_information_disclosure_via_unprivileged_access_to_SMU_configuration_backup_data",
+ "url": "https://knowledge.hitachivantara.com/Security/System_Management_Unit_(SMU)_versions_prior_to_14.8.7825.01%2C_used_to_manage_Hitachi_Vantara_NAS_products_is_susceptible_to_unintended_information_disclosure_via_unprivileged_access_to_SMU_configuration_backup_data.",
"source": "security.vulnerabilities@hitachivantara.com"
}
]
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6566.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6566.json
index 15e497badf9..29dae01098a 100644
--- a/CVE-2023/CVE-2023-65xx/CVE-2023-6566.json
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6566.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6566",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-12-07T00:15:07.120",
- "lastModified": "2023-12-07T12:12:36.717",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T15:54:28.520",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -15,6 +15,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@@ -40,8 +62,18 @@
},
"weaknesses": [
{
- "source": "security@huntr.dev",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ },
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -50,14 +82,38 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.0.0",
+ "matchCriteriaId": "1CF90546-1596-44C3-8F49-77B4CDD14DFD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/microweber/microweber/commit/eee0c6771e152022a91089a547272c8a542bb74e",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.com/bounties/cf4b68b5-8d97-4d05-9cde-e76b1a414fd6",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6588.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6588.json
index 958b8033cc8..0561be830cf 100644
--- a/CVE-2023/CVE-2023-65xx/CVE-2023-6588.json
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6588.json
@@ -2,19 +2,79 @@
"id": "CVE-2023-6588",
"sourceIdentifier": "security@devolutions.net",
"published": "2023-12-07T16:15:07.727",
- "lastModified": "2023-12-07T17:36:41.553",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T18:50:19.453",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\n\n\nOffline mode is always enabled, even if permission disallows it, in \nDevolutions Server data source in Devolutions Workspace 2023.3.2.0 and \nearlier. This allows an attacker with access to the Workspace \napplication to access credentials when offline.\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "El modo sin conexi\u00f3n siempre est\u00e1 habilitado, incluso si el permiso no lo permite, en la fuente de datos del servidor de Devolutions en Devolutions Workspace 2023.3.2.0 y versiones anteriores. Esto permite que un atacante con acceso a la aplicaci\u00f3n Workspace acceda a las credenciales cuando est\u00e9 desconectado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:workspace:*:*:*:*:-:*:*:*",
+ "versionEndIncluding": "2023.3.2.0",
+ "matchCriteriaId": "749703AF-A1F3-4405-8677-EF10330FEC7B"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2023-0022/",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6593.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6593.json
new file mode 100644
index 00000000000..650dec752fb
--- /dev/null
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6593.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-6593",
+ "sourceIdentifier": "security@devolutions.net",
+ "published": "2023-12-12T15:15:07.920",
+ "lastModified": "2023-12-12T15:52:06.410",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\nClient side permission bypass in Devolutions Remote Desktop Manager 2023.3.4.0 and earlier on iOS allows an attacker that has access to the application to execute entries in a SQL data source without restriction.\n\n\n"
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://devolutions.net/security/advisories/DEVO-2023-0023/",
+ "source": "security@devolutions.net"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6599.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6599.json
index 09289eaef2d..d1bd3b18c4a 100644
--- a/CVE-2023/CVE-2023-65xx/CVE-2023-6599.json
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6599.json
@@ -2,15 +2,41 @@
"id": "CVE-2023-6599",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-12-08T00:15:08.113",
- "lastModified": "2023-12-08T14:23:10.393",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:22:17.503",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Missing Standardized Error Handling Mechanism in GitHub repository microweber/microweber prior to 2.0."
+ },
+ {
+ "lang": "es",
+ "value": "Falta un mecanismo de manejo de errores estandarizado en el repositorio de GitHub microweber/microweber anterior a 2.0."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@@ -36,8 +62,18 @@
},
"weaknesses": [
{
- "source": "security@huntr.dev",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-755"
+ }
+ ]
+ },
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -46,14 +82,41 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.0.0",
+ "matchCriteriaId": "1CF90546-1596-44C3-8F49-77B4CDD14DFD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/microweber/microweber/commit/f7eb9e1c6e801346f07f3b0164a01ac5f2ca5cfd",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.com/bounties/6198785c-bf60-422e-9b80-68a6e658a10e",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Issue Tracking",
+ "Patch",
+ "Technical Description"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6607.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6607.json
index bf427826618..857923dcb0c 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6607.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6607.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-6607",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-08T14:15:07.203",
- "lastModified": "2023-12-08T14:23:10.393",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-12T17:15:41.850",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Tongda OA 2017 up to 11.10 and classified as critical. Affected by this vulnerability is an unknown functionality of the file general/wiki/cp/manage/delete.php. The manipulation of the argument TERM_ID_STR leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247243. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Tongda OA 2017 hasta 11.10 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo general/wiki/cp/manage/delete.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento TERM_ID_STR conduce a la inyecci\u00f3n SQL. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-247243. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "cna@vuldb.com",
"type": "Secondary",
@@ -71,18 +95,54 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tongda2000:tongda_oa:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "11.10",
+ "matchCriteriaId": "C9499005-4C72-4FA6-99EB-749B5AF3F4BE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tongda2000:tongda_oa:2017:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A77F4CAB-A2ED-4AFF-B9C7-03C69B14AE9D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/willchen0011/cve/blob/main/sql.md",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.247243",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?id.247243",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
}
]
}
\ No newline at end of file
diff --git a/README.md b/README.md
index c8940734721..73fedbd227f 100644
--- a/README.md
+++ b/README.md
@@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
-2023-12-12T15:05:09.825551+00:00
+2023-12-12T19:00:21.077491+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
-2023-12-12T14:55:06.163000+00:00
+2023-12-12T18:58:44.580000+00:00
```
### Last Data Feed Release
@@ -29,69 +29,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
-232849
+232907
```
### CVEs added in the last Commit
-Recently added CVEs: `26`
+Recently added CVEs: `58`
-* [CVE-2020-12612](CVE-2020/CVE-2020-126xx/CVE-2020-12612.json) (`2023-12-12T14:15:07.327`)
-* [CVE-2022-46141](CVE-2022/CVE-2022-461xx/CVE-2022-46141.json) (`2023-12-12T12:15:10.003`)
-* [CVE-2022-47374](CVE-2022/CVE-2022-473xx/CVE-2022-47374.json) (`2023-12-12T12:15:10.563`)
-* [CVE-2022-47375](CVE-2022/CVE-2022-473xx/CVE-2022-47375.json) (`2023-12-12T12:15:10.797`)
-* [CVE-2023-6727](CVE-2023/CVE-2023-67xx/CVE-2023-6727.json) (`2023-12-12T11:15:07.140`)
-* [CVE-2023-38380](CVE-2023/CVE-2023-383xx/CVE-2023-38380.json) (`2023-12-12T12:15:11.477`)
-* [CVE-2023-46156](CVE-2023/CVE-2023-461xx/CVE-2023-46156.json) (`2023-12-12T12:15:13.417`)
-* [CVE-2023-46281](CVE-2023/CVE-2023-462xx/CVE-2023-46281.json) (`2023-12-12T12:15:13.653`)
-* [CVE-2023-46282](CVE-2023/CVE-2023-462xx/CVE-2023-46282.json) (`2023-12-12T12:15:13.870`)
-* [CVE-2023-46283](CVE-2023/CVE-2023-462xx/CVE-2023-46283.json) (`2023-12-12T12:15:14.067`)
-* [CVE-2023-46284](CVE-2023/CVE-2023-462xx/CVE-2023-46284.json) (`2023-12-12T12:15:14.273`)
-* [CVE-2023-46285](CVE-2023/CVE-2023-462xx/CVE-2023-46285.json) (`2023-12-12T12:15:14.477`)
-* [CVE-2023-48427](CVE-2023/CVE-2023-484xx/CVE-2023-48427.json) (`2023-12-12T12:15:14.677`)
-* [CVE-2023-48428](CVE-2023/CVE-2023-484xx/CVE-2023-48428.json) (`2023-12-12T12:15:14.873`)
-* [CVE-2023-48429](CVE-2023/CVE-2023-484xx/CVE-2023-48429.json) (`2023-12-12T12:15:15.083`)
-* [CVE-2023-48430](CVE-2023/CVE-2023-484xx/CVE-2023-48430.json) (`2023-12-12T12:15:15.433`)
-* [CVE-2023-48431](CVE-2023/CVE-2023-484xx/CVE-2023-48431.json) (`2023-12-12T12:15:15.777`)
-* [CVE-2023-49691](CVE-2023/CVE-2023-496xx/CVE-2023-49691.json) (`2023-12-12T12:15:15.990`)
-* [CVE-2023-49692](CVE-2023/CVE-2023-496xx/CVE-2023-49692.json) (`2023-12-12T12:15:16.203`)
-* [CVE-2023-49990](CVE-2023/CVE-2023-499xx/CVE-2023-49990.json) (`2023-12-12T14:15:07.553`)
-* [CVE-2023-49991](CVE-2023/CVE-2023-499xx/CVE-2023-49991.json) (`2023-12-12T14:15:07.600`)
-* [CVE-2023-49992](CVE-2023/CVE-2023-499xx/CVE-2023-49992.json) (`2023-12-12T14:15:07.653`)
-* [CVE-2023-49993](CVE-2023/CVE-2023-499xx/CVE-2023-49993.json) (`2023-12-12T14:15:07.700`)
-* [CVE-2023-49994](CVE-2023/CVE-2023-499xx/CVE-2023-49994.json) (`2023-12-12T14:15:07.750`)
-* [CVE-2023-6193](CVE-2023/CVE-2023-61xx/CVE-2023-6193.json) (`2023-12-12T14:15:07.797`)
+* [CVE-2023-36012](CVE-2023/CVE-2023-360xx/CVE-2023-36012.json) (`2023-12-12T18:15:21.970`)
+* [CVE-2023-36019](CVE-2023/CVE-2023-360xx/CVE-2023-36019.json) (`2023-12-12T18:15:22.157`)
+* [CVE-2023-36020](CVE-2023/CVE-2023-360xx/CVE-2023-36020.json) (`2023-12-12T18:15:22.333`)
+* [CVE-2023-36391](CVE-2023/CVE-2023-363xx/CVE-2023-36391.json) (`2023-12-12T18:15:22.510`)
+* [CVE-2023-36696](CVE-2023/CVE-2023-366xx/CVE-2023-36696.json) (`2023-12-12T18:15:22.690`)
+* [CVE-2023-43364](CVE-2023/CVE-2023-433xx/CVE-2023-43364.json) (`2023-12-12T18:15:22.887`)
+* [CVE-2023-48313](CVE-2023/CVE-2023-483xx/CVE-2023-48313.json) (`2023-12-12T18:15:22.933`)
+* [CVE-2023-49923](CVE-2023/CVE-2023-499xx/CVE-2023-49923.json) (`2023-12-12T18:15:23.153`)
+* [CVE-2023-20275](CVE-2023/CVE-2023-202xx/CVE-2023-20275.json) (`2023-12-12T18:15:16.520`)
+* [CVE-2023-21740](CVE-2023/CVE-2023-217xx/CVE-2023-21740.json) (`2023-12-12T18:15:16.720`)
+* [CVE-2023-35619](CVE-2023/CVE-2023-356xx/CVE-2023-35619.json) (`2023-12-12T18:15:16.913`)
+* [CVE-2023-35621](CVE-2023/CVE-2023-356xx/CVE-2023-35621.json) (`2023-12-12T18:15:17.090`)
+* [CVE-2023-35622](CVE-2023/CVE-2023-356xx/CVE-2023-35622.json) (`2023-12-12T18:15:17.260`)
+* [CVE-2023-35624](CVE-2023/CVE-2023-356xx/CVE-2023-35624.json) (`2023-12-12T18:15:17.440`)
+* [CVE-2023-35625](CVE-2023/CVE-2023-356xx/CVE-2023-35625.json) (`2023-12-12T18:15:17.620`)
+* [CVE-2023-35628](CVE-2023/CVE-2023-356xx/CVE-2023-35628.json) (`2023-12-12T18:15:17.807`)
+* [CVE-2023-35629](CVE-2023/CVE-2023-356xx/CVE-2023-35629.json) (`2023-12-12T18:15:17.990`)
+* [CVE-2023-35630](CVE-2023/CVE-2023-356xx/CVE-2023-35630.json) (`2023-12-12T18:15:18.183`)
+* [CVE-2023-35631](CVE-2023/CVE-2023-356xx/CVE-2023-35631.json) (`2023-12-12T18:15:18.360`)
+* [CVE-2023-35632](CVE-2023/CVE-2023-356xx/CVE-2023-35632.json) (`2023-12-12T18:15:18.547`)
+* [CVE-2023-35633](CVE-2023/CVE-2023-356xx/CVE-2023-35633.json) (`2023-12-12T18:15:18.760`)
+* [CVE-2023-35634](CVE-2023/CVE-2023-356xx/CVE-2023-35634.json) (`2023-12-12T18:15:18.937`)
+* [CVE-2023-35635](CVE-2023/CVE-2023-356xx/CVE-2023-35635.json) (`2023-12-12T18:15:19.107`)
+* [CVE-2023-35636](CVE-2023/CVE-2023-356xx/CVE-2023-35636.json) (`2023-12-12T18:15:19.277`)
+* [CVE-2023-35638](CVE-2023/CVE-2023-356xx/CVE-2023-35638.json) (`2023-12-12T18:15:19.460`)
### CVEs modified in the last Commit
-Recently modified CVEs: `148`
+Recently modified CVEs: `90`
-* [CVE-2023-45316](CVE-2023/CVE-2023-453xx/CVE-2023-45316.json) (`2023-12-12T13:43:48.853`)
-* [CVE-2023-45847](CVE-2023/CVE-2023-458xx/CVE-2023-45847.json) (`2023-12-12T13:43:48.853`)
-* [CVE-2023-46701](CVE-2023/CVE-2023-467xx/CVE-2023-46701.json) (`2023-12-12T13:43:48.853`)
-* [CVE-2023-48677](CVE-2023/CVE-2023-486xx/CVE-2023-48677.json) (`2023-12-12T13:43:48.853`)
-* [CVE-2023-49563](CVE-2023/CVE-2023-495xx/CVE-2023-49563.json) (`2023-12-12T13:43:48.853`)
-* [CVE-2023-49607](CVE-2023/CVE-2023-496xx/CVE-2023-49607.json) (`2023-12-12T13:43:48.853`)
-* [CVE-2023-49695](CVE-2023/CVE-2023-496xx/CVE-2023-49695.json) (`2023-12-12T13:43:48.853`)
-* [CVE-2023-49809](CVE-2023/CVE-2023-498xx/CVE-2023-49809.json) (`2023-12-12T13:43:48.853`)
-* [CVE-2023-49874](CVE-2023/CVE-2023-498xx/CVE-2023-49874.json) (`2023-12-12T13:43:48.853`)
-* [CVE-2023-6547](CVE-2023/CVE-2023-65xx/CVE-2023-6547.json) (`2023-12-12T13:43:48.853`)
-* [CVE-2023-41963](CVE-2023/CVE-2023-419xx/CVE-2023-41963.json) (`2023-12-12T13:43:48.853`)
-* [CVE-2023-49140](CVE-2023/CVE-2023-491xx/CVE-2023-49140.json) (`2023-12-12T13:43:48.853`)
-* [CVE-2023-49143](CVE-2023/CVE-2023-491xx/CVE-2023-49143.json) (`2023-12-12T13:43:48.853`)
-* [CVE-2023-49713](CVE-2023/CVE-2023-497xx/CVE-2023-49713.json) (`2023-12-12T13:43:48.853`)
-* [CVE-2023-4932](CVE-2023/CVE-2023-49xx/CVE-2023-4932.json) (`2023-12-12T13:43:48.853`)
-* [CVE-2023-4958](CVE-2023/CVE-2023-49xx/CVE-2023-4958.json) (`2023-12-12T13:43:48.853`)
-* [CVE-2023-38711](CVE-2023/CVE-2023-387xx/CVE-2023-38711.json) (`2023-12-12T13:52:11.970`)
-* [CVE-2023-49282](CVE-2023/CVE-2023-492xx/CVE-2023-49282.json) (`2023-12-12T13:53:20.400`)
-* [CVE-2023-4015](CVE-2023/CVE-2023-40xx/CVE-2023-4015.json) (`2023-12-12T14:31:41.517`)
-* [CVE-2023-30589](CVE-2023/CVE-2023-305xx/CVE-2023-30589.json) (`2023-12-12T14:33:56.690`)
-* [CVE-2023-46736](CVE-2023/CVE-2023-467xx/CVE-2023-46736.json) (`2023-12-12T14:34:20.427`)
-* [CVE-2023-32254](CVE-2023/CVE-2023-322xx/CVE-2023-32254.json) (`2023-12-12T14:38:38.447`)
-* [CVE-2023-32250](CVE-2023/CVE-2023-322xx/CVE-2023-32250.json) (`2023-12-12T14:39:13.577`)
-* [CVE-2023-31248](CVE-2023/CVE-2023-312xx/CVE-2023-31248.json) (`2023-12-12T14:39:59.203`)
-* [CVE-2023-49094](CVE-2023/CVE-2023-490xx/CVE-2023-49094.json) (`2023-12-12T14:55:06.163`)
+* [CVE-2023-49007](CVE-2023/CVE-2023-490xx/CVE-2023-49007.json) (`2023-12-12T17:13:30.867`)
+* [CVE-2023-5808](CVE-2023/CVE-2023-58xx/CVE-2023-5808.json) (`2023-12-12T17:15:08.400`)
+* [CVE-2023-6538](CVE-2023/CVE-2023-65xx/CVE-2023-6538.json) (`2023-12-12T17:15:08.493`)
+* [CVE-2023-6607](CVE-2023/CVE-2023-66xx/CVE-2023-6607.json) (`2023-12-12T17:15:41.850`)
+* [CVE-2023-49487](CVE-2023/CVE-2023-494xx/CVE-2023-49487.json) (`2023-12-12T17:19:08.283`)
+* [CVE-2023-49247](CVE-2023/CVE-2023-492xx/CVE-2023-49247.json) (`2023-12-12T17:19:24.277`)
+* [CVE-2023-49486](CVE-2023/CVE-2023-494xx/CVE-2023-49486.json) (`2023-12-12T17:19:42.290`)
+* [CVE-2023-49485](CVE-2023/CVE-2023-494xx/CVE-2023-49485.json) (`2023-12-12T17:19:56.587`)
+* [CVE-2023-6146](CVE-2023/CVE-2023-61xx/CVE-2023-6146.json) (`2023-12-12T17:20:59.940`)
+* [CVE-2023-6599](CVE-2023/CVE-2023-65xx/CVE-2023-6599.json) (`2023-12-12T17:22:17.503`)
+* [CVE-2023-39167](CVE-2023/CVE-2023-391xx/CVE-2023-39167.json) (`2023-12-12T17:43:09.240`)
+* [CVE-2023-39172](CVE-2023/CVE-2023-391xx/CVE-2023-39172.json) (`2023-12-12T17:49:44.890`)
+* [CVE-2023-39169](CVE-2023/CVE-2023-391xx/CVE-2023-39169.json) (`2023-12-12T17:57:54.800`)
+* [CVE-2023-39171](CVE-2023/CVE-2023-391xx/CVE-2023-39171.json) (`2023-12-12T17:59:53.220`)
+* [CVE-2023-47440](CVE-2023/CVE-2023-474xx/CVE-2023-47440.json) (`2023-12-12T18:06:36.190`)
+* [CVE-2023-41905](CVE-2023/CVE-2023-419xx/CVE-2023-41905.json) (`2023-12-12T18:10:29.040`)
+* [CVE-2023-41172](CVE-2023/CVE-2023-411xx/CVE-2023-41172.json) (`2023-12-12T18:11:23.157`)
+* [CVE-2023-6275](CVE-2023/CVE-2023-62xx/CVE-2023-6275.json) (`2023-12-12T18:15:23.363`)
+* [CVE-2023-39909](CVE-2023/CVE-2023-399xx/CVE-2023-39909.json) (`2023-12-12T18:20:27.780`)
+* [CVE-2023-49492](CVE-2023/CVE-2023-494xx/CVE-2023-49492.json) (`2023-12-12T18:21:17.307`)
+* [CVE-2023-49493](CVE-2023/CVE-2023-494xx/CVE-2023-49493.json) (`2023-12-12T18:23:26.673`)
+* [CVE-2023-6273](CVE-2023/CVE-2023-62xx/CVE-2023-6273.json) (`2023-12-12T18:36:55.433`)
+* [CVE-2023-6588](CVE-2023/CVE-2023-65xx/CVE-2023-6588.json) (`2023-12-12T18:50:19.453`)
+* [CVE-2023-33411](CVE-2023/CVE-2023-334xx/CVE-2023-33411.json) (`2023-12-12T18:53:04.930`)
+* [CVE-2023-40300](CVE-2023/CVE-2023-403xx/CVE-2023-40300.json) (`2023-12-12T18:55:01.573`)
## Download and Usage