diff --git a/CVE-2009/CVE-2009-41xx/CVE-2009-4123.json b/CVE-2009/CVE-2009-41xx/CVE-2009-4123.json new file mode 100644 index 00000000000..10553a7d7b0 --- /dev/null +++ b/CVE-2009/CVE-2009-41xx/CVE-2009-4123.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2009-4123", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T16:15:07.407", + "lastModified": "2023-12-12T17:22:30.567", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The jruby-openssl gem before 0.6 for JRuby mishandles SSL certificate validation." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://jruby.org/2009/12/07/vulnerability-in-jruby-openssl", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/advisories/GHSA-xgv7-pqqh-h2w9", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jruby-openssl/CVE-2009-4123.yml", + "source": "cve@mitre.org" + }, + { + "url": "https://web.archive.org/web/20101213091125/http://jruby.org/2009/12/07/vulnerability-in-jruby-openssl", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2013/CVE-2013-25xx/CVE-2013-2513.json b/CVE-2013/CVE-2013-25xx/CVE-2013-2513.json new file mode 100644 index 00000000000..ad4169d370b --- /dev/null +++ b/CVE-2013/CVE-2013-25xx/CVE-2013-2513.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2013-2513", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T16:15:07.490", + "lastModified": "2023-12-12T17:22:30.567", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The flash_tool gem through 0.6.0 for Ruby allows command execution via shell metacharacters in the name of a downloaded file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/advisories/GHSA-6325-6g32-7p35", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/flash_tool/CVE-2013-2513.yml", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2179.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2179.json new file mode 100644 index 00000000000..aeba833d726 --- /dev/null +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2179.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2015-2179", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T17:15:07.383", + "lastModified": "2023-12-12T17:22:30.567", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The xaviershay-dm-rails gem 0.10.3.8 for Ruby allows local users to discover MySQL credentials by listing a process and its arguments." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://www.vapid.dhs.org/advisory.php?v=115", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2015/CVE-2015-83xx/CVE-2015-8314.json b/CVE-2015/CVE-2015-83xx/CVE-2015-8314.json new file mode 100644 index 00000000000..123eebd364f --- /dev/null +++ b/CVE-2015/CVE-2015-83xx/CVE-2015-8314.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2015-8314", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T17:15:07.450", + "lastModified": "2023-12-12T17:22:30.567", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The Devise gem before 3.5.4 for Ruby mishandles Remember Me cookies for sessions, which may allow an adversary to obtain unauthorized persistent application access." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/advisories/GHSA-746g-3gfp-hfhw", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/heartcombo/devise/commit/c92996646aba2d25b2c3e235fe0c4f1a84b70d24", + "source": "cve@mitre.org" + }, + { + "url": "https://rubysec.com/advisories/CVE-2015-8314/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2018/CVE-2018-161xx/CVE-2018-16153.json b/CVE-2018/CVE-2018-161xx/CVE-2018-16153.json new file mode 100644 index 00000000000..cb1e755c09d --- /dev/null +++ b/CVE-2018/CVE-2018-161xx/CVE-2018-16153.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2018-16153", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T17:15:07.517", + "lastModified": "2023-12-12T17:22:30.567", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Apereo Opencast 4.x through 10.x before 10.6. It sends system digest credentials during authentication attempts to arbitrary external services in some situations." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://docs.opencast.org/r/10.x/admin/#changelog", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/advisories/GHSA-hcxx-mp6g-6gr9", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51", + "source": "cve@mitre.org" + }, + { + "url": "https://www.apereo.org/projects/opencast/news", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-106xx/CVE-2020-10676.json b/CVE-2020/CVE-2020-106xx/CVE-2020-10676.json new file mode 100644 index 00000000000..9fd9e3ccb7f --- /dev/null +++ b/CVE-2020/CVE-2020-106xx/CVE-2020-10676.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2020-10676", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T17:15:07.580", + "lastModified": "2023-12-12T17:22:30.567", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In Rancher 2.x before 2.6.13 and 2.7.x before 2.7.4, an incorrectly applied authorization check allows users who have certain access to a namespace to move that namespace to a different project." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://forums.rancher.com/c/announcements", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/advisories/GHSA-8vhc-hwhc-cpj4", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/rancher/rancher/releases/tag/v2.6.13", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/rancher/rancher/releases/tag/v2.7.4", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-126xx/CVE-2020-12612.json b/CVE-2020/CVE-2020-126xx/CVE-2020-12612.json index acb35b91b04..9a5932c9030 100644 --- a/CVE-2020/CVE-2020-126xx/CVE-2020-12612.json +++ b/CVE-2020/CVE-2020-126xx/CVE-2020-12612.json @@ -2,8 +2,8 @@ "id": "CVE-2020-12612", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T14:15:07.327", - "lastModified": "2023-12-12T14:15:07.327", - "vulnStatus": "Received", + "lastModified": "2023-12-12T15:52:06.410", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-126xx/CVE-2020-12614.json b/CVE-2020/CVE-2020-126xx/CVE-2020-12614.json new file mode 100644 index 00000000000..9ac76537027 --- /dev/null +++ b/CVE-2020/CVE-2020-126xx/CVE-2020-12614.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2020-12614", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T15:15:07.363", + "lastModified": "2023-12-12T15:52:06.410", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. If the publisher criteria is selected, it defines the name of a publisher that must be present in the certificate (and also requires that the certificate is valid). If an Add Admin token is protected by this criteria, it can be leveraged by a malicious actor to achieve Elevation of Privileges from standard user to administrator." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.beyondtrust.com/support/changelog/privilege-management-for-windows-5-6-sr1", + "source": "cve@mitre.org" + }, + { + "url": "https://www.beyondtrust.com/trust-center/security-advisories/bt22-10", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-283xx/CVE-2020-28369.json b/CVE-2020/CVE-2020-283xx/CVE-2020-28369.json new file mode 100644 index 00000000000..a8e1de34db9 --- /dev/null +++ b/CVE-2020/CVE-2020-283xx/CVE-2020-28369.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2020-28369", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T15:15:07.450", + "lastModified": "2023-12-12T15:52:06.410", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In BeyondTrust Privilege Management for Windows (aka PMfW) through 5.7, a SYSTEM installation causes Cryptbase.dll to be loaded from the user-writable location %WINDIR%\\Temp." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.beyondtrust.com/privilege-management/windows-mac", + "source": "cve@mitre.org" + }, + { + "url": "https://www.beyondtrust.com/trust-center/security-advisories/bt22-08", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-244xx/CVE-2022-24403.json b/CVE-2022/CVE-2022-244xx/CVE-2022-24403.json index bc4b52b7ade..bfc3d9e5597 100644 --- a/CVE-2022/CVE-2022-244xx/CVE-2022-24403.json +++ b/CVE-2022/CVE-2022-244xx/CVE-2022-24403.json @@ -2,16 +2,40 @@ "id": "CVE-2022-24403", "sourceIdentifier": "cert@ncsc.nl", "published": "2023-12-05T14:15:07.510", - "lastModified": "2023-12-05T15:27:54.807", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:04:43.967", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The TETRA TA61 identity encryption function internally uses a 64-bit value derived exclusively from the SCK (Class 2 networks) or CCK (Class 3 networks). The structure of TA61 allows for efficient recovery of this 64-bit value, allowing an adversary to encrypt or decrypt arbitrary identities given only three known encrypted/unencrypted identity pairs." + }, + { + "lang": "es", + "value": "La funci\u00f3n de cifrado de identidad TETRA TA61 utiliza internamente un valor de 64 bits derivado exclusivamente de SCK (redes Clase 2) o CCK (redes Clase 3). La estructura de TA61 permite una recuperaci\u00f3n eficiente de este valor de 64 bits, lo que permite a un adversario cifrar o descifrar identidades arbitrarias con solo tres pares de identidades cifradas/no cifradas conocidas." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "cert@ncsc.nl", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + }, { "source": "cert@ncsc.nl", "type": "Secondary", @@ -46,10 +80,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:midnightblue:tetra\\:burst:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E47ED5D3-E6C3-419A-9A3B-9F20863B9FDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://tetraburst.com/", - "source": "cert@ncsc.nl" + "source": "cert@ncsc.nl", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44543.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44543.json new file mode 100644 index 00000000000..0f74bce2c68 --- /dev/null +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44543.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-44543", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T17:15:07.663", + "lastModified": "2023-12-12T17:22:30.567", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The femanager extension before 5.5.2, 6.x before 6.3.3, and 7.x before 7.0.1 for TYPO3 allows creation of frontend users in restricted groups (if there is a usergroup field on the registration form). This occurs because the usergroup.inList protection mechanism is mishandled." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://typo3.org/help/security-advisories", + "source": "cve@mitre.org" + }, + { + "url": "https://typo3.org/security/advisory/typo3-ext-sa-2022-015", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45362.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45362.json index 3568d15d701..062cb941b43 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45362.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45362.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45362", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-07T11:15:07.260", - "lastModified": "2023-12-07T12:12:22.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:01:04.050", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,7 +60,7 @@ }, "weaknesses": [ { - "source": "audit@patchstack.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -48,12 +68,43 @@ "value": "CWE-918" } ] + }, + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:paytm:payment_gateway:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.7.0", + "matchCriteriaId": "314EA12B-7C66-491F-93AE-0D5682605636" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/paytm-payments/wordpress-paytm-payment-gateway-plugin-2-7-0-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20275.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20275.json new file mode 100644 index 00000000000..57f8d6dace4 --- /dev/null +++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20275.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-20275", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2023-12-12T18:15:16.520", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to send packets with another VPN user's source IP address. This vulnerability is due to improper validation of the packet's inner source IP address after decryption. An attacker could exploit this vulnerability by sending crafted packets through the tunnel. A successful exploit could allow the attacker to send a packet impersonating another VPN user's IP address. It is not possible for the attacker to receive return packets." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-vpn-Y88QOm77", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21740.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21740.json new file mode 100644 index 00000000000..dc05fd4e555 --- /dev/null +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21740.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21740", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:16.720", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Windows Media Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21740", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26920.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26920.json new file mode 100644 index 00000000000..34e5dc800cd --- /dev/null +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26920.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-26920", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T17:15:07.720", + "lastModified": "2023-12-12T17:22:30.567", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "fast-xml-parser before 4.1.2 allows __proto__ for Prototype Pollution." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Sudistark/a5a45bd0804d522a1392cb5023aa7ef7", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/2b032a4f799c63d83991e4f992f1c68e4dd05804", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/advisories/GHSA-793h-6f7r-6qvm", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-280xx/CVE-2023-28017.json b/CVE-2023/CVE-2023-280xx/CVE-2023-28017.json index ee95c34b1cc..2b0163fafdf 100644 --- a/CVE-2023/CVE-2023-280xx/CVE-2023-28017.json +++ b/CVE-2023/CVE-2023-280xx/CVE-2023-28017.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28017", "sourceIdentifier": "psirt@hcl.com", "published": "2023-12-07T05:15:07.970", - "lastModified": "2023-12-07T12:12:36.717", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T15:51:51.903", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "psirt@hcl.com", "type": "Secondary", @@ -38,10 +58,58 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:connections:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "217197F0-089E-463E-904D-BDB31F929FE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:connections:6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D9D30E64-F094-4692-A882-CAAA3AFE8C1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:connections:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FD4BF4C3-3D45-41A8-886F-521E095CBBF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:connections:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D55E0F2F-7C8D-4334-8B8D-CCF88431F6DF" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108264", - "source": "psirt@hcl.com" + "source": "psirt@hcl.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28465.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28465.json new file mode 100644 index 00000000000..0f7d9952789 --- /dev/null +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28465.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-28465", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T17:15:07.770", + "lastModified": "2023-12-12T17:22:30.567", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The package-decompression feature in HL7 (Health Level 7) FHIR Core Libraries before 5.6.106 allows attackers to copy arbitrary files to certain directories via directory traversal, if an allowed directory name is a substring of the directory name chosen by the attacker. NOTE: this issue exists because of an incomplete fix for CVE-2023-24057." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/advisories/GHSA-9654-pr4f-gh6m", + "source": "cve@mitre.org" + }, + { + "url": "https://www.smilecdr.com/our-blog", + "source": "cve@mitre.org" + }, + { + "url": "https://www.smilecdr.com/our-blog/statement-on-cve-2023-24057-smile-digital-health", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28580.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28580.json index e499d4f7add..16b189aedfb 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28580.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28580.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28580", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:09.390", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:52:17.877", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "product-security@qualcomm.com", "type": "Secondary", @@ -38,10 +58,1216 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AEA324C-69CE-4AAC-91D6-6FAAE1B3FA77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7B5F5CD-CE26-4C93-9FED-F783947DBDA6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28585.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28585.json index 996aabe8e4e..bc26c5bd7ea 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28585.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28585.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28585", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:09.563", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:16:10.227", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + }, { "source": "product-security@qualcomm.com", "type": "Secondary", @@ -38,10 +58,7614 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:9205_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "920F873B-F52D-4754-9726-BECCAD0CAC45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:9205_lte_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5EB573E2-C2B9-4B12-9EEF-9152FBFE3927" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:c-v2x_9150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B80D6366-4C0C-4C0D-9A38-769C66D62F0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AA32CC0-DE30-4B15-8EC6-1FAF14C5C4E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "770F3924-BE27-4BDE-B922-680B3C9753EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fsm10056_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0EF47C0-45AA-4B1C-B9E8-A83E5D9938F9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fsm10056:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A78E2A04-CD5D-4963-A45D-B111DD5E0B44" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1AA3313-749F-486B-8212-33E569377C2B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_3210_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6F6D44F-BD86-44B9-BE5D-471D33F0438D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BB0662A-2D27-4AE7-8370-0B567B9A8214" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_326_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "67970B89-2F06-4E4A-88CA-9D37C060C1BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq5332_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A795F64D-6DE9-4D56-AA22-D77470B9E5AD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq5332:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32521715-D9BF-4A86-BE4B-D9BB29C133F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA7A5C46-48BF-42A9-A477-A660C6D7B437" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDB79382-19D6-4A67-9013-7099A9C58829" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6005_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4695A9D-A02C-4E73-A327-E811C55B4EDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6005:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28E41848-525C-4126-89C2-54BD193768DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5CF970F-17AE-4C59-89A5-5B41A41E1DE0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71C54A70-AAA8-4B5E-AC1B-471A5C7E79B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B04589FF-F299-4EF6-A57B-1AD145372DBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDC1ADAD-DA77-47EF-8DB9-C36961C560C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06126F30-D081-4A11-92FB-4074A451FAF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2550040-CCC7-4B52-8D3E-7948B3E3C62B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78A6F4F3-0CE3-4A02-B615-63E76C93ADC4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*", + "matchCriteriaId": "31D07608-80F7-44AA-BE91-1F97FC1CE313" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq9554_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C656780-05E9-40D5-936B-B73ECE9E0330" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq9554:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD2DF80E-E546-473B-AE26-594CFB8A87A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq9570_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A6182C0-AAE7-45A9-8ECB-F198B55181AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq9570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61FC3830-8AAF-4836-89C3-2C6355CC0272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0327D8C9-DD6B-4831-BBD4-2EE57A351493" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C866E83-23ED-495C-AA5A-0B01973674BF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9205s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AEA758D-ECAD-4973-9586-2621CC3B2BA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9205s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4F1EED8-567D-4E1B-92D6-37ADE97B06FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca0000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC941093-1A7C-47B2-AB3B-05AE4AE2FBE4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca0000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A2AA834-C17C-4E0E-A510-795818041E47" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFB39496-8699-4DAF-BD7B-AE69260B20CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9CFBC24-5F15-40DE-806E-62C1EE808992" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C359D1E7-6E0A-41B5-ABE5-B55598960700" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4DC3CE7-0C4A-458B-A42E-8F80C062DD5F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B0F8ED6-EAE7-44EA-A8C6-F5AD408261F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "966CDA56-809F-4FF4-909D-0DD92F44CF67" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C90747B4-2CC0-4816-A994-58E00F5ADA05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00FE294D-4BE0-4436-9273-507E760884EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*", + "matchCriteriaId": "424CB795-58E5-43A4-A2EC-C563D93C5E72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93ED74CE-6BF2-4983-8780-07D5336745B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", + "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BFC575E-594E-4711-94B1-2DC8D03B9AC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8072_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F4012FC-F0D9-41DE-BC2A-FBDD1B212540" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8072:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B16C4C53-F8BA-48D2-A7EE-90A06499722D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC8A5A87-7D62-4EB7-962A-0F160DE3E889" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B68D126-7F49-4FFA-8AF8-78120973D78E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB1F2E8B-1ED2-473D-AFD8-F2590F6BD414" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FBDA9657-7D30-41FD-8112-F53E6C69D53A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B9045A8-BA53-43C4-B24D-5EF320DE7A4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D6E8939-AFA3-41AC-B811-BCC282A43106" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B87335A8-DC52-478E-B19F-0C4CC63132EA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99C34523-FE2A-4DDC-9A8A-D9072F3D0FD3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08E9E6CB-2216-4AF2-81C2-D482598298BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4774FAA6-6141-4B08-819C-58D4D9A2B69F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98E58C63-F253-4DCC-8A14-48FEB64B4C3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93BA2DC9-5B4F-4F8F-8B3D-8DA01043B9BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FA8880F-E513-4390-B839-C5D86E7A89EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcf8000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A05AC12-9E7A-4837-A447-1718396011FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcf8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E3FF297-D849-45AE-AAB8-DDEA64A23FF3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "287199B4-9CBB-4290-BDB3-ABBB41794259" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcf8001:-:*:*:*:*:*:*:*", + "matchCriteriaId": "142DC510-DD92-4174-8B37-4D239573661E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "214A053F-D80C-4AD9-B4F1-83384095A3F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74EBA77E-69A5-4145-9BEC-CD39BA132309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*", + "matchCriteriaId": "163FE96E-DF5B-4B67-8EDE-44A5B9A8492D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FBB16DC4-CDC9-4936-9C6A-0ED8E1F6D056" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5021_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0F7D48A-7D06-46C5-A093-FAA12666A666" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5021:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58DF7FA9-72B4-454D-AED7-ED9531B118BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "478B79F0-D257-41B2-965B-3E251A584D45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B6D2C9D-1BF9-4D78-90FB-B7633DD87E67" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85740DB4-3B08-48A4-ACAF-7BBB2612009A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A0BD404-5EBA-4988-91B6-ECE8FCF4F041" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5121_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7582D75-412A-4CF8-9507-FB9AD10FBCC0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5121:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E1CA0C2-13AD-4D4F-9FCD-882E2045D871" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "290BFC8A-0D76-4BCD-B059-2DAFD368A10C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*", + "matchCriteriaId": "936A308A-92B9-468C-9BC6-8FD71C7C2315" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EAE1EBF-AD14-4C07-99B5-2547A5196B20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4829FF9-C0BA-4E40-A01A-3EF179462029" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63FF89C5-3BBF-4A13-8A3B-F490C2FA1A95" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6784EC5F-2C26-49C5-9A03-6FD2056C04EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F466A5BD-1912-4811-9A93-81555F101D46" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F92914E-16F6-4A25-9FEF-FB7CB3377132" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BCCFF8B-4857-439D-BD4A-EB35672F474B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86896D55-89F5-440B-9082-916E486B65D9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02BA009F-24E1-4953-BA95-2A5BC1CDBDBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9013_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1EC8266-96C3-44F2-B9FA-5A5E0815565B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F4612E3-E1C9-4225-A5E9-C854BF3FA28D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36A10EB2-E7A2-461F-836E-FC38B9428C98" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A457C1D6-A026-4B5F-9CB1-FA795785A515" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C10CAAC-FD93-4116-9F0C-E983B3693FAF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FEC2402-BA39-49BB-A34C-FF32ED44A158" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "809FD84D-11C5-4EE3-B830-62CF5F6CB1BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFD77A52-D53C-424F-9E17-160B710469C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9129A244-AB8C-4AA4-BFBB-37F84D66BD3E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41F243A1-3C0B-4780-95BF-69A4E1A91F18" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76E03AE9-2485-449B-BCFD-3E452BB01FC6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFCB9F22-57F2-4327-95B9-B2342A02E45E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DA2C3E1-E285-4CAD-9FA3-813C8EC436F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F68F9B33-6BA5-46E1-A370-547CDA626985" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "487E7EA3-CE9C-4DB9-97D9-A74406C8BC9B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "644A4FF4-1494-480B-BDBA-22CC13C4E8EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D13E375-0562-4263-8452-53E117F14E83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "407EE4D5-1F52-40D6-B85A-E49915D6EF2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5846C9DD-63E5-482D-BE01-3A1E89CC0EDE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B6A4AA9-E35B-4B25-9FD3-BFB907B822DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AC8538B-6663-4CF7-BD4A-9766C04CBAB5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F5F9F3D-1F57-4D16-972E-AF39E438E4C3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1110:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53D6BEFE-AA21-4786-B11C-A6683AC06622" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32E0EBD5-A846-44F9-9DEC-1C6711C96A5B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C68F8102-788C-4EF3-83E4-56DF764DFFBC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B7AB84B-55D0-45EB-ABA8-F69E5179507E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdx1010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B908A65E-F3B2-417A-91EE-1BE855BABD2E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6554B2E1-AE96-40CE-A19F-C7516CDBC41A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdx1011:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1991232B-B58F-481E-A7EE-0546E64C12CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ECC6966-23CF-4189-81B3-477A97E38B05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1032:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01490429-D26C-4F80-83A4-8DC257142B86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EAAB699-BFDA-465B-9B82-5E957C67D52A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1052:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D2C3994-110F-40FA-B60F-D2C85A36E256" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C81773C-4A1C-4589-A6FD-A85770F3ADFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1062:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CABCCB94-8C93-4CF1-9EA1-D410FF6ACD72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C194363-7FDE-43C9-B6FE-2BD6B474816F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8CC9433-6B33-4B9C-8EC3-BBBB43897E5C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1894F6B9-31DA-44E8-AA28-064F73EBEE8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AA23845-D9F5-4035-8A93-F475D865586F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qts110_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2D4B026-2118-448D-A48D-36864DE715B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qts110:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ED10480-E005-452C-A03C-D669CE94ABE4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AEA324C-69CE-4AAC-91D6-6FAAE1B3FA77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7B5F5CD-CE26-4C93-9FED-F783947DBDA6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F357160-9EF0-4150-893B-746289C071AD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc5_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3429F7D-C5C7-488E-8E32-518838C51621" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb3_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85FE8AF5-3747-40D0-9DE3-5A77E05251C6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb3_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB7865B5-FAD2-4FC3-B708-0EE4AA4E4EB1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA73E75-F339-49BA-B1F6-619E4630DE92" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb5_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DA6E940-1059-4EA2-8225-0F754FE9F50F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A558A868-1B67-48D2-8A94-FDEA7126FAE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7964A762-467B-47D7-865F-30D48A0AE47C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D6F8899-136A-4A57-9F02-BD428E1663DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75AFAA21-0589-4C6A-9418-34EE8A61BBAD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C819454D-D413-478A-B78D-CFF6994803A1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14E3FE58-7F1C-4F5C-B62D-0CF124E14AB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFCB0BBA-3F81-4FCA-B3DE-190C46DA50DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "589C1001-E9F6-41A6-BCC8-A94A3C97F2E6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33D393A6-4586-4416-86EB-F9D86DC3DED8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D1A7C-537F-458B-BA56-A11F95E36EA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "716DEC4D-D854-44CD-8A14-AA5AFD96809E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52036768-810C-40C2-9213-8397A4073703" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE8AB22C-54EA-4D61-B6F9-7BC45820D29E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BE7001-5539-4C5E-A064-6E62023803AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06661DAC-5D22-433E-B5EC-486931E265B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B8DA94C-23A0-4C99-9F05-144B9B5224B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39E10E22-E7CC-41D6-80F3-030083F45645" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1497D052-884E-496B-BEF8-6904A25125ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "589F4888-28F6-4ECA-860E-8054C2A8C419" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC4DA7EA-DB81-4C71-A875-2612D8D7D726" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*", + "matchCriteriaId": "48F26F64-98D4-420A-8918-E5E56ABA1D47" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18431C93-7497-4A2C-9B5A-B9E4C7F88B7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0BF0FFBA-73EC-4615-98D2-BA62D67353DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx65m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08C59BD9-8629-467F-9C1C-F2232C821DDB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx65m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E7510FC-E89C-4EE4-84AE-8002E48937D2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFA7BB42-305C-451F-92D8-0718DF68A012" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B93301-AFE8-409B-A8C8-6754BE5A0C14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B185412C-177F-48E2-87F9-1269E0FB8E31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FACA2BF1-85D3-447F-A08D-B90330A22550" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2ABA18D-82C1-4366-B1D7-DED42DD3D5C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3FB2972-94B6-4716-BA96-4B452BA3990F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57F4F872-094E-4E27-BB89-D8251FAFB713" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57B0086F-5F2C-4F89-AC53-D8429D6506CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:smart_audio_400_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB8145C8-D978-4047-9203-602E854E7290" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CCBF666-CB4E-44E1-9676-6891EDC73578" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C767AB6A-1A8C-406C-A600-96A816F44E2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "390D7CAF-6C0B-4438-AA7D-AEEE127F4D3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_460_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BB1FC5E-CF6F-4E54-B78D-C01AFD034903" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA3F11F3-C9F4-460D-BD77-1BFBCC1F0592" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25673A10-D99C-4F67-BDA7-9C2E4A70EF9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50906EF2-01F7-4E97-9F49-F892DF41CB29" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B23A89FF-9C94-40C6-B9B7-3E8354777916" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37DF4D73-3ACC-41B3-8CA4-20DAECE6BFB7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_662_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE08D23A-2D0D-4472-8847-27B955F55165" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_665_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9151A7D-4A02-4EDD-830E-3408BBB2B0C3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_665_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73D551AC-1008-444B-8A69-CF8CE60942FF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_670_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9871C72-4B99-43E5-B389-EB26996B08DD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_670_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "586E725A-B3F6-4C4D-AE46-0D76A0C0D91E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_675_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABF96A66-FECF-4D2F-94C5-7BFC746789E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_675_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28638583-F98D-4B88-AF50-A10642D6A105" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_678_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1B3C6D8-F06D-48DE-9127-0E574578E501" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_678_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A933F383-717C-4D7B-836A-76042F55488F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D0ED00F-1345-43AD-83C6-E979890B84AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92C28019-B57D-4487-B551-F7B53395C6E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C174F07D-0E33-43FD-9BAD-6C6D8B51B6A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47311B68-A07F-448B-99D5-9C92C8127A81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A930E317-7F22-4605-A85F-144921EEBA0C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAF50FDA-47FA-491B-BEAE-76CC38C18F52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9A2DA11-5E4E-4E36-923C-A2D3CC2F2751" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE7DFAD4-1D21-4A3A-9E8C-10F00AD7C403" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_710_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEAB1AE-53FE-4641-A2BB-4E1449A76E8C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_710_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E92D896-80E5-47C6-A752-F19F1CB8005D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_712_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9B4C948-7C2F-41E5-8111-9A17673E2787" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_712_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2504D653-29C7-4F1F-991C-AA50A4E5E092" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6B6B409-33F8-49CA-9A09-3AA97DCBCE54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_720g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F34AF35-8A0B-4B90-8AE6-EC961B7FEC4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAE7612E-5C12-467E-95EC-90D0A984E086" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D76005A3-22FC-45C1-A01A-8640F030E6A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E454506E-21BE-4BC9-91B9-21DC2AEA63E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D06996C-0832-4406-9581-1327345E95B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_732g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0E3DAEC-1C6C-41D4-867D-A246C51A7F08" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_732g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4E25E7B-7391-479A-AE10-E593ADF7A5B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A96C773B-B228-4A39-8CAE-AEA0EE6E5699" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "898FE463-291B-4C89-BEC5-8B99EA18CF23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C9940B4-672B-4D82-B904-80A3FC1DD4C2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11ADEB65-9803-4036-AAB4-B85E430B626D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD14F17B-FDC3-4B1B-9901-E40B783E77C6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8FD2424-599C-4137-9BB0-378F34B7AB3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6037264-BF88-4BCA-9F5F-B5D30587D9A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BABB84B3-C5BC-4AE9-AB6E-BA4BAF9FBECB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87ECCB82-B880-412D-A635-CA6F0B035F2B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "424743C4-CE74-4A02-835A-023C9DA0CFAC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14EA48BF-BD65-43B2-8DC1-D97F75AD6FE5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B86E317F-12BF-42F6-879B-88A85F7E3F81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4C68227-8928-41C4-A6B8-CD142C018AB6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "38E60ED4-9FB7-481E-915B-B7576566E0BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "194A4BD4-0DDF-49E5-AA89-40A5BFB71933" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72FF9732-40D8-4C12-8259-BAA16FAB5A56" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65B3644E-74B5-41BB-BA43-F3E588D152CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c_compute_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75F10C87-25C4-40A5-9B7E-904C2258CB3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_gen_2_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC68355A-3202-4317-9767-26AFDD321789" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c_gen_2_compute_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF331899-4AA1-4D55-B494-4FA47BB97AE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D56B0CD3-138D-4197-84D5-2887C8FA40D2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_845_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E289B26-AF53-442A-9740-2F44D1F59DA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_850_mobile_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "355080DC-FC83-45C1-AB1A-21533638C181" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_850_mobile_compute_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5167E425-3B5D-4F79-B6AF-599820BEB33E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF26AC15-F805-4FEB-9CFC-BD530FA114F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17A6D87A-544D-4B8E-884A-0117C499DD8D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9F4285-1F09-40CD-B1AA-84B406FD6A71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8623DD44-DFDD-442D-9789-11A527A450A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22303AD4-779C-45A3-8F33-3864C45E4328" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EC440D-D420-4477-8F14-427245B80631" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41446A77-6EF3-4570-BAD2-4C761A2C4E7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "448C401B-EF07-4385-A7B4-123D7808F64F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22A78236-5965-4F65-9001-3FE7FF6D27E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "414C5C1D-A5DA-47C7-B6C9-3564DD4DD911" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01CBD543-635C-4C57-87B7-55DD3BA3C1A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A7272B6-AADB-4CCD-B041-66170C313C76" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-ad_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9AEC3A05-8F33-4028-B7A8-9EBA236FDA9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-ad:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D997EED-E10B-446E-8B51-5D3C611E0F62" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-ad_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A27DE47-C6D7-4E24-9041-08D8444DDAD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-ad:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBDF16D-8B58-4031-9C51-424D155336F5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "039AEC8D-9372-4737-B846-CBF1F23ADCAA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-aa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4306FDC5-6F33-4462-B5B0-27125DFD9F5A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "073ED3B4-6ADE-4E7F-A797-523DA85AF09C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "156A1CD6-2827-4D0C-B8F4-FB0C7774CD75" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B28A559B-EA1A-408C-9C92-8CF8A62397CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F22559E6-CB6A-48BD-8E30-7B4E2CA7B7A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00CB649A-DA70-4713-98B0-883CC404E5DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-aa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F8F9C8A-6E84-40C9-A0B9-21AAF60E43E7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8280xp-ab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19CDBCF0-01C7-4D9D-A896-283C3B21512B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8280xp-ab:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79D59603-1A41-4CE3-A5C3-5A2EBD1BA1A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB6053F0-5E34-458A-B084-078E4D4F4021" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_1300_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A402233-B76F-41D5-B7C2-325C8FC4D560" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_1300_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8643194-C881-408A-AAA1-78572075120A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x24_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CAB1351-A614-4E73-B58E-7D624695C657" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x24_lte_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4494AAD7-D132-41DB-9756-CAD1F3F7AE7E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69D1567F-D669-4415-9A08-110221EFA6BA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x50_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF808C56-AD46-4351-9A46-6A2B6AAAB5BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAD88351-1DA2-4CE5-BCEB-3C64BD16468A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03149AA1-8048-4675-8C6F-18FD32E54064" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1E1B7FD-39CD-42AB-A113-2AFB25B5F85B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C93EECE3-7A8A-4B58-A674-134040CE43FE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF9740EB-F82E-42EA-993E-A393B05CC6BB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "022A5532-03F7-4FB8-BA0D-4221178C9486" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_4g_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C8F12FE-0057-4A13-9A7F-D12C114ECEF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_4g_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1271B0C7-2D91-4129-9B58-E6689DD68C39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BA4BA00-C8D1-4DAC-8030-CB5EEC7D4591" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDC270A7-205C-41EB-A2E5-2A381A16BFBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF839E24-6542-4C5D-A1B7-FD3BA00683CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9F12284-93E0-482D-9D35-EB38BA7D6C6D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E1753FC-F3CD-4B50-886D-8E16D9301A84" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3E20681-4FC4-46E2-AF77-BCF03BC8E77E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_300_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1708266E-EB99-475A-AB48-B2ACEE5657EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_300_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FEBBF98A-40C2-4386-85C5-5B1D445CC846" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E685A5C-870C-41E9-91AA-7AA7535C4D85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_400_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8F52FE7-2C9C-4908-A578-2230ED6A1505" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC012AD0-BCEE-4B1E-9B15-5D77D78CEA01" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F51C69B9-F0AB-4BF5-A8C2-64FEB7075593" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D6C6B2-36DC-4D0D-AFF8-2108A090A78D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28FEB3B1-F641-436D-AC4F-3304C37167C4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2503805B-B2A6-4AEE-8AB1-2B8A040702BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3AD370C-2ED0-43CF-83D9-50DC92A01CA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF49BC31-A332-4B9A-A826-F63116D7029F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DD3C245-D5F8-4145-8CDF-F635D2C8F088" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28586.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28586.json index 3b02f13dc54..ef9fa8c1945 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28586.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28586.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28586", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:09.750", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:11:28.417", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + }, { "source": "product-security@qualcomm.com", "type": "Secondary", @@ -38,10 +58,8478 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:9205_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "920F873B-F52D-4754-9726-BECCAD0CAC45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:9205_lte_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5EB573E2-C2B9-4B12-9EEF-9152FBFE3927" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:c-v2x_9150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B80D6366-4C0C-4C0D-9A38-769C66D62F0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AA32CC0-DE30-4B15-8EC6-1FAF14C5C4E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "770F3924-BE27-4BDE-B922-680B3C9753EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fsm10056_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0EF47C0-45AA-4B1C-B9E8-A83E5D9938F9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fsm10056:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A78E2A04-CD5D-4963-A45D-B111DD5E0B44" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:home_hub_100_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08E5DFB7-9516-4019-8F74-D9584BC01D23" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:home_hub_100_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2EDB814-A56C-4A85-B8AB-566D42BC9EB5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1AA3313-749F-486B-8212-33E569377C2B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_3210_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6F6D44F-BD86-44B9-BE5D-471D33F0438D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BB0662A-2D27-4AE7-8370-0B567B9A8214" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_326_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "67970B89-2F06-4E4A-88CA-9D37C060C1BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq5332_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A795F64D-6DE9-4D56-AA22-D77470B9E5AD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq5332:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32521715-D9BF-4A86-BE4B-D9BB29C133F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA7A5C46-48BF-42A9-A477-A660C6D7B437" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDB79382-19D6-4A67-9013-7099A9C58829" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6005_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4695A9D-A02C-4E73-A327-E811C55B4EDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6005:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28E41848-525C-4126-89C2-54BD193768DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5CF970F-17AE-4C59-89A5-5B41A41E1DE0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71C54A70-AAA8-4B5E-AC1B-471A5C7E79B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B04589FF-F299-4EF6-A57B-1AD145372DBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDC1ADAD-DA77-47EF-8DB9-C36961C560C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06126F30-D081-4A11-92FB-4074A451FAF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2550040-CCC7-4B52-8D3E-7948B3E3C62B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78A6F4F3-0CE3-4A02-B615-63E76C93ADC4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*", + "matchCriteriaId": "31D07608-80F7-44AA-BE91-1F97FC1CE313" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq9554_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C656780-05E9-40D5-936B-B73ECE9E0330" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq9554:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD2DF80E-E546-473B-AE26-594CFB8A87A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq9570_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A6182C0-AAE7-45A9-8ECB-F198B55181AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq9570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61FC3830-8AAF-4836-89C3-2C6355CC0272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0327D8C9-DD6B-4831-BBD4-2EE57A351493" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C866E83-23ED-495C-AA5A-0B01973674BF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9205s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AEA758D-ECAD-4973-9586-2621CC3B2BA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9205s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4F1EED8-567D-4E1B-92D6-37ADE97B06FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA44E1D7-C4B5-4A1C-8D89-C080856104EE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "268F94E5-15A2-4BCA-BE1B-0B6A7179B9C9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADC6FBEE-D2FA-4660-A078-D6CE2097653D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6BD8A1C-D9AB-4BE7-A855-31E58631879C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C8807E9-5972-47E7-8B39-2E4D68C7B79E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8108:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57963412-14B9-4C0D-AA0D-6928445DB808" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8209_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29F64FA7-5EA1-4C91-B409-4A0E966FBD26" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FBCA5AB-07E4-404E-A278-28F6004D2126" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8608_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99AE9AEA-4D9F-4879-85F7-405279EFE5ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8608:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDED3AA7-576C-4437-A466-D627698F4242" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca0000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC941093-1A7C-47B2-AB3B-05AE4AE2FBE4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca0000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A2AA834-C17C-4E0E-A510-795818041E47" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFB39496-8699-4DAF-BD7B-AE69260B20CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9CFBC24-5F15-40DE-806E-62C1EE808992" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C359D1E7-6E0A-41B5-ABE5-B55598960700" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4DC3CE7-0C4A-458B-A42E-8F80C062DD5F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6234_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "912215EB-CF3C-4AA4-B3F5-2EB19B131427" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6234:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2C7FE6F-6106-4EF3-9925-95B25D047418" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B0F8ED6-EAE7-44EA-A8C6-F5AD408261F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886CF046-E1D9-4FD4-AC02-EAB61C3F70FD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "059486E9-3F99-4C65-A763-470564EDAF2C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "966CDA56-809F-4FF4-909D-0DD92F44CF67" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C90747B4-2CC0-4816-A994-58E00F5ADA05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00FE294D-4BE0-4436-9273-507E760884EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*", + "matchCriteriaId": "424CB795-58E5-43A4-A2EC-C563D93C5E72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93ED74CE-6BF2-4983-8780-07D5336745B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", + "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BFC575E-594E-4711-94B1-2DC8D03B9AC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8072_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F4012FC-F0D9-41DE-BC2A-FBDD1B212540" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8072:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B16C4C53-F8BA-48D2-A7EE-90A06499722D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC8A5A87-7D62-4EB7-962A-0F160DE3E889" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B68D126-7F49-4FFA-8AF8-78120973D78E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB1F2E8B-1ED2-473D-AFD8-F2590F6BD414" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FBDA9657-7D30-41FD-8112-F53E6C69D53A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B9045A8-BA53-43C4-B24D-5EF320DE7A4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D6E8939-AFA3-41AC-B811-BCC282A43106" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B87335A8-DC52-478E-B19F-0C4CC63132EA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99C34523-FE2A-4DDC-9A8A-D9072F3D0FD3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08E9E6CB-2216-4AF2-81C2-D482598298BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4774FAA6-6141-4B08-819C-58D4D9A2B69F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AD0E09B-92EC-4974-BC5F-66C3AAF586B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBA48AB-85F4-4D6C-B811-87756B80FFB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98E58C63-F253-4DCC-8A14-48FEB64B4C3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25565FDA-651D-4A05-8B1E-2188B6921253" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8D49750-BBEA-4A3D-9898-28B7A50A7F42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93BA2DC9-5B4F-4F8F-8B3D-8DA01043B9BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FA8880F-E513-4390-B839-C5D86E7A89EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcf8000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A05AC12-9E7A-4837-A447-1718396011FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcf8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E3FF297-D849-45AE-AAB8-DDEA64A23FF3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "287199B4-9CBB-4290-BDB3-ABBB41794259" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcf8001:-:*:*:*:*:*:*:*", + "matchCriteriaId": "142DC510-DD92-4174-8B37-4D239573661E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "214A053F-D80C-4AD9-B4F1-83384095A3F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74EBA77E-69A5-4145-9BEC-CD39BA132309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*", + "matchCriteriaId": "163FE96E-DF5B-4B67-8EDE-44A5B9A8492D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FBB16DC4-CDC9-4936-9C6A-0ED8E1F6D056" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5021_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0F7D48A-7D06-46C5-A093-FAA12666A666" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5021:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58DF7FA9-72B4-454D-AED7-ED9531B118BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "478B79F0-D257-41B2-965B-3E251A584D45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B6D2C9D-1BF9-4D78-90FB-B7633DD87E67" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85740DB4-3B08-48A4-ACAF-7BBB2612009A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A0BD404-5EBA-4988-91B6-ECE8FCF4F041" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5121_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7582D75-412A-4CF8-9507-FB9AD10FBCC0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5121:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E1CA0C2-13AD-4D4F-9FCD-882E2045D871" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "290BFC8A-0D76-4BCD-B059-2DAFD368A10C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*", + "matchCriteriaId": "936A308A-92B9-468C-9BC6-8FD71C7C2315" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EAE1EBF-AD14-4C07-99B5-2547A5196B20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4829FF9-C0BA-4E40-A01A-3EF179462029" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63FF89C5-3BBF-4A13-8A3B-F490C2FA1A95" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6784EC5F-2C26-49C5-9A03-6FD2056C04EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C9D1966-30F0-414D-BE75-0A14B12A1457" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD28C87D-1D28-4C84-BFE4-56EE3BF2C6B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F466A5BD-1912-4811-9A93-81555F101D46" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F92914E-16F6-4A25-9FEF-FB7CB3377132" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BCCFF8B-4857-439D-BD4A-EB35672F474B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86896D55-89F5-440B-9082-916E486B65D9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02BA009F-24E1-4953-BA95-2A5BC1CDBDBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9013_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1EC8266-96C3-44F2-B9FA-5A5E0815565B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9013:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F4612E3-E1C9-4225-A5E9-C854BF3FA28D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36A10EB2-E7A2-461F-836E-FC38B9428C98" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A457C1D6-A026-4B5F-9CB1-FA795785A515" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C10CAAC-FD93-4116-9F0C-E983B3693FAF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FEC2402-BA39-49BB-A34C-FF32ED44A158" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "809FD84D-11C5-4EE3-B830-62CF5F6CB1BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFD77A52-D53C-424F-9E17-160B710469C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9129A244-AB8C-4AA4-BFBB-37F84D66BD3E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41F243A1-3C0B-4780-95BF-69A4E1A91F18" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76E03AE9-2485-449B-BCFD-3E452BB01FC6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFCB9F22-57F2-4327-95B9-B2342A02E45E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DA2C3E1-E285-4CAD-9FA3-813C8EC436F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F68F9B33-6BA5-46E1-A370-547CDA626985" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "487E7EA3-CE9C-4DB9-97D9-A74406C8BC9B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "644A4FF4-1494-480B-BDBA-22CC13C4E8EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D13E375-0562-4263-8452-53E117F14E83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "407EE4D5-1F52-40D6-B85A-E49915D6EF2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5846C9DD-63E5-482D-BE01-3A1E89CC0EDE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B6A4AA9-E35B-4B25-9FD3-BFB907B822DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AC8538B-6663-4CF7-BD4A-9766C04CBAB5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F5F9F3D-1F57-4D16-972E-AF39E438E4C3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1110:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53D6BEFE-AA21-4786-B11C-A6683AC06622" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32E0EBD5-A846-44F9-9DEC-1C6711C96A5B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C68F8102-788C-4EF3-83E4-56DF764DFFBC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B7AB84B-55D0-45EB-ABA8-F69E5179507E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdx1010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B908A65E-F3B2-417A-91EE-1BE855BABD2E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6554B2E1-AE96-40CE-A19F-C7516CDBC41A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdx1011:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1991232B-B58F-481E-A7EE-0546E64C12CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ECC6966-23CF-4189-81B3-477A97E38B05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1032:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01490429-D26C-4F80-83A4-8DC257142B86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EAAB699-BFDA-465B-9B82-5E957C67D52A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1052:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D2C3994-110F-40FA-B60F-D2C85A36E256" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C81773C-4A1C-4589-A6FD-A85770F3ADFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1062:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CABCCB94-8C93-4CF1-9EA1-D410FF6ACD72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C194363-7FDE-43C9-B6FE-2BD6B474816F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8CC9433-6B33-4B9C-8EC3-BBBB43897E5C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1894F6B9-31DA-44E8-AA28-064F73EBEE8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AA23845-D9F5-4035-8A93-F475D865586F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qts110_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2D4B026-2118-448D-A48D-36864DE715B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qts110:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ED10480-E005-452C-A03C-D669CE94ABE4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_205_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8F2B255-04B5-4982-8018-F43EDD4F7912" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_205_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4DE45CB-E697-489D-BFCA-1BBA48FF0846" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AEA324C-69CE-4AAC-91D6-6FAAE1B3FA77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7B5F5CD-CE26-4C93-9FED-F783947DBDA6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F357160-9EF0-4150-893B-746289C071AD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc5_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3429F7D-C5C7-488E-8E32-518838C51621" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb3_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85FE8AF5-3747-40D0-9DE3-5A77E05251C6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb3_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB7865B5-FAD2-4FC3-B708-0EE4AA4E4EB1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA73E75-F339-49BA-B1F6-619E4630DE92" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb5_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DA6E940-1059-4EA2-8225-0F754FE9F50F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A558A868-1B67-48D2-8A94-FDEA7126FAE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7964A762-467B-47D7-865F-30D48A0AE47C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D6F8899-136A-4A57-9F02-BD428E1663DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75AFAA21-0589-4C6A-9418-34EE8A61BBAD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C819454D-D413-478A-B78D-CFF6994803A1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14E3FE58-7F1C-4F5C-B62D-0CF124E14AB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFCB0BBA-3F81-4FCA-B3DE-190C46DA50DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "589C1001-E9F6-41A6-BCC8-A94A3C97F2E6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33D393A6-4586-4416-86EB-F9D86DC3DED8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D1A7C-537F-458B-BA56-A11F95E36EA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "716DEC4D-D854-44CD-8A14-AA5AFD96809E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52036768-810C-40C2-9213-8397A4073703" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE8AB22C-54EA-4D61-B6F9-7BC45820D29E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BE7001-5539-4C5E-A064-6E62023803AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06661DAC-5D22-433E-B5EC-486931E265B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B8DA94C-23A0-4C99-9F05-144B9B5224B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39E10E22-E7CC-41D6-80F3-030083F45645" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1497D052-884E-496B-BEF8-6904A25125ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "589F4888-28F6-4ECA-860E-8054C2A8C419" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC4DA7EA-DB81-4C71-A875-2612D8D7D726" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*", + "matchCriteriaId": "48F26F64-98D4-420A-8918-E5E56ABA1D47" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC508C49-0B76-43A8-B2AF-0F8EB989E238" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9665200-D306-4EEB-9F42-6C5963524179" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd821_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A54F4A3-19E3-4825-98C7-DA632D692A06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd821:-:*:*:*:*:*:*:*", + "matchCriteriaId": "028CD81A-0D9D-40B0-9E2F-DC8689607B24" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18431C93-7497-4A2C-9B5A-B9E4C7F88B7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0BF0FFBA-73EC-4615-98D2-BA62D67353DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx65m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08C59BD9-8629-467F-9C1C-F2232C821DDB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx65m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E7510FC-E89C-4EE4-84AE-8002E48937D2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFA7BB42-305C-451F-92D8-0718DF68A012" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B93301-AFE8-409B-A8C8-6754BE5A0C14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B185412C-177F-48E2-87F9-1269E0FB8E31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FACA2BF1-85D3-447F-A08D-B90330A22550" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2ABA18D-82C1-4366-B1D7-DED42DD3D5C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3FB2972-94B6-4716-BA96-4B452BA3990F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57F4F872-094E-4E27-BB89-D8251FAFB713" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:smart_audio_200_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE9BAA26-7377-4D96-965C-1CD54FD487B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:smart_audio_200_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "306C7C27-1363-4FF6-AC71-BB8DB908D058" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57B0086F-5F2C-4F89-AC53-D8429D6506CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:smart_audio_400_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB8145C8-D978-4047-9203-602E854E7290" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_208_processor_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CC78837-E44B-4D03-A9B1-C3494D823207" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_208_processor:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF94E560-681D-48E7-9429-9B4BDB89393B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_210_processor_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C8490C5-0F0C-4AC6-A80F-06EF08E8C39E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_210_processor:-:*:*:*:*:*:*:*", + "matchCriteriaId": "680B7C89-F3C0-49DA-A73E-CCDCF0A71CF0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_212_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70E745D7-3E43-42B1-9CBE-CA53846D0660" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_212_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13DA9023-07FE-46B5-9F3B-D6A2C5AED241" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CCBF666-CB4E-44E1-9676-6891EDC73578" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C767AB6A-1A8C-406C-A600-96A816F44E2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "390D7CAF-6C0B-4438-AA7D-AEEE127F4D3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_460_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BB1FC5E-CF6F-4E54-B78D-C01AFD034903" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA3F11F3-C9F4-460D-BD77-1BFBCC1F0592" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25673A10-D99C-4F67-BDA7-9C2E4A70EF9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50906EF2-01F7-4E97-9F49-F892DF41CB29" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B23A89FF-9C94-40C6-B9B7-3E8354777916" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37DF4D73-3ACC-41B3-8CA4-20DAECE6BFB7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_662_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE08D23A-2D0D-4472-8847-27B955F55165" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_665_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9151A7D-4A02-4EDD-830E-3408BBB2B0C3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_665_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73D551AC-1008-444B-8A69-CF8CE60942FF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_670_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9871C72-4B99-43E5-B389-EB26996B08DD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_670_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "586E725A-B3F6-4C4D-AE46-0D76A0C0D91E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_675_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABF96A66-FECF-4D2F-94C5-7BFC746789E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_675_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28638583-F98D-4B88-AF50-A10642D6A105" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_678_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1B3C6D8-F06D-48DE-9127-0E574578E501" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_678_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A933F383-717C-4D7B-836A-76042F55488F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D0ED00F-1345-43AD-83C6-E979890B84AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92C28019-B57D-4487-B551-F7B53395C6E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C174F07D-0E33-43FD-9BAD-6C6D8B51B6A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47311B68-A07F-448B-99D5-9C92C8127A81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A930E317-7F22-4605-A85F-144921EEBA0C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAF50FDA-47FA-491B-BEAE-76CC38C18F52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9A2DA11-5E4E-4E36-923C-A2D3CC2F2751" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE7DFAD4-1D21-4A3A-9E8C-10F00AD7C403" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_710_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEAB1AE-53FE-4641-A2BB-4E1449A76E8C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_710_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E92D896-80E5-47C6-A752-F19F1CB8005D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_712_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9B4C948-7C2F-41E5-8111-9A17673E2787" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_712_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2504D653-29C7-4F1F-991C-AA50A4E5E092" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6B6B409-33F8-49CA-9A09-3AA97DCBCE54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_720g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F34AF35-8A0B-4B90-8AE6-EC961B7FEC4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAE7612E-5C12-467E-95EC-90D0A984E086" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D76005A3-22FC-45C1-A01A-8640F030E6A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E454506E-21BE-4BC9-91B9-21DC2AEA63E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D06996C-0832-4406-9581-1327345E95B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_732g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0E3DAEC-1C6C-41D4-867D-A246C51A7F08" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_732g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4E25E7B-7391-479A-AE10-E593ADF7A5B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A96C773B-B228-4A39-8CAE-AEA0EE6E5699" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "898FE463-291B-4C89-BEC5-8B99EA18CF23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C9940B4-672B-4D82-B904-80A3FC1DD4C2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11ADEB65-9803-4036-AAB4-B85E430B626D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD14F17B-FDC3-4B1B-9901-E40B783E77C6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8FD2424-599C-4137-9BB0-378F34B7AB3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6037264-BF88-4BCA-9F5F-B5D30587D9A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BABB84B3-C5BC-4AE9-AB6E-BA4BAF9FBECB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87ECCB82-B880-412D-A635-CA6F0B035F2B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "424743C4-CE74-4A02-835A-023C9DA0CFAC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14EA48BF-BD65-43B2-8DC1-D97F75AD6FE5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B86E317F-12BF-42F6-879B-88A85F7E3F81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4C68227-8928-41C4-A6B8-CD142C018AB6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "38E60ED4-9FB7-481E-915B-B7576566E0BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "194A4BD4-0DDF-49E5-AA89-40A5BFB71933" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72FF9732-40D8-4C12-8259-BAA16FAB5A56" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65B3644E-74B5-41BB-BA43-F3E588D152CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c_compute_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75F10C87-25C4-40A5-9B7E-904C2258CB3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_gen_2_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC68355A-3202-4317-9767-26AFDD321789" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c_gen_2_compute_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF331899-4AA1-4D55-B494-4FA47BB97AE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_automotive_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22B3AB46-81F4-4C45-AF66-C8B36A175685" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_automotive_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A8198E0-C95A-4433-9EC0-F544CAA90251" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5799B243-F73E-483B-A2A4-6DB25AEBB08D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D534FDF-3084-4FAC-800E-D71497F9DDFB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_821_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6A92FCC-A844-448F-9291-4E923ACA55E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_821_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CF4B1EC-D38A-4FAD-8A4E-D0521F66005E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81FC1C9D-D494-4426-93FF-A774D68554D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_835_mobile_pc_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B4837E0-EFF7-4546-918C-03551E03F6BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D56B0CD3-138D-4197-84D5-2887C8FA40D2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_845_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E289B26-AF53-442A-9740-2F44D1F59DA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_850_mobile_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "355080DC-FC83-45C1-AB1A-21533638C181" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_850_mobile_compute_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5167E425-3B5D-4F79-B6AF-599820BEB33E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF26AC15-F805-4FEB-9CFC-BD530FA114F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17A6D87A-544D-4B8E-884A-0117C499DD8D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9F4285-1F09-40CD-B1AA-84B406FD6A71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8623DD44-DFDD-442D-9789-11A527A450A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22303AD4-779C-45A3-8F33-3864C45E4328" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EC440D-D420-4477-8F14-427245B80631" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41446A77-6EF3-4570-BAD2-4C761A2C4E7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "448C401B-EF07-4385-A7B4-123D7808F64F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22A78236-5965-4F65-9001-3FE7FF6D27E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "414C5C1D-A5DA-47C7-B6C9-3564DD4DD911" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01CBD543-635C-4C57-87B7-55DD3BA3C1A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A7272B6-AADB-4CCD-B041-66170C313C76" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-ad_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9AEC3A05-8F33-4028-B7A8-9EBA236FDA9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-ad:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D997EED-E10B-446E-8B51-5D3C611E0F62" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-ad_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A27DE47-C6D7-4E24-9041-08D8444DDAD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-ad:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBDF16D-8B58-4031-9C51-424D155336F5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "039AEC8D-9372-4737-B846-CBF1F23ADCAA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-aa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4306FDC5-6F33-4462-B5B0-27125DFD9F5A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "073ED3B4-6ADE-4E7F-A797-523DA85AF09C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "156A1CD6-2827-4D0C-B8F4-FB0C7774CD75" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B28A559B-EA1A-408C-9C92-8CF8A62397CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F22559E6-CB6A-48BD-8E30-7B4E2CA7B7A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00CB649A-DA70-4713-98B0-883CC404E5DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-aa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F8F9C8A-6E84-40C9-A0B9-21AAF60E43E7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8280xp-ab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19CDBCF0-01C7-4D9D-A896-283C3B21512B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8280xp-ab:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79D59603-1A41-4CE3-A5C3-5A2EBD1BA1A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB6053F0-5E34-458A-B084-078E4D4F4021" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_1300_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A402233-B76F-41D5-B7C2-325C8FC4D560" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_1300_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8643194-C881-408A-AAA1-78572075120A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05396B5E-C70F-4D83-84AA-7A7DB1B7B0E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x12_lte_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E180EE7-5254-4C57-B4EE-BF2A9C21CA94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x24_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CAB1351-A614-4E73-B58E-7D624695C657" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x24_lte_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4494AAD7-D132-41DB-9756-CAD1F3F7AE7E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69D1567F-D669-4415-9A08-110221EFA6BA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x50_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF808C56-AD46-4351-9A46-6A2B6AAAB5BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAD88351-1DA2-4CE5-BCEB-3C64BD16468A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03149AA1-8048-4675-8C6F-18FD32E54064" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1E1B7FD-39CD-42AB-A113-2AFB25B5F85B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C93EECE3-7A8A-4B58-A674-134040CE43FE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF9740EB-F82E-42EA-993E-A393B05CC6BB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "022A5532-03F7-4FB8-BA0D-4221178C9486" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_4g_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C8F12FE-0057-4A13-9A7F-D12C114ECEF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_4g_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1271B0C7-2D91-4129-9B58-E6689DD68C39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BA4BA00-C8D1-4DAC-8030-CB5EEC7D4591" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDC270A7-205C-41EB-A2E5-2A381A16BFBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF839E24-6542-4C5D-A1B7-FD3BA00683CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9F12284-93E0-482D-9D35-EB38BA7D6C6D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E1753FC-F3CD-4B50-886D-8E16D9301A84" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3E20681-4FC4-46E2-AF77-BCF03BC8E77E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_300_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1708266E-EB99-475A-AB48-B2ACEE5657EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_300_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FEBBF98A-40C2-4386-85C5-5B1D445CC846" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E685A5C-870C-41E9-91AA-7AA7535C4D85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_400_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8F52FE7-2C9C-4908-A578-2230ED6A1505" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC012AD0-BCEE-4B1E-9B15-5D77D78CEA01" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F51C69B9-F0AB-4BF5-A8C2-64FEB7075593" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43A90019-4E96-40B5-9E4D-CCBDD51ACA34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC3D23FE-B3D5-4EC3-8268-98F12181966D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D6C6B2-36DC-4D0D-AFF8-2108A090A78D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28FEB3B1-F641-436D-AC4F-3304C37167C4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2503805B-B2A6-4AEE-8AB1-2B8A040702BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3AD370C-2ED0-43CF-83D9-50DC92A01CA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DAFD64E7-3F13-4DCA-8C46-6E8FE0C6F798" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "044A14FB-64F6-4200-AC85-8DC91C31BD16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9590EF1F-E821-4525-943B-4A315ACAEFFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A7D32B3-325E-4B1F-8649-3D0071396BBA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF49BC31-A332-4B9A-A826-F63116D7029F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DD3C245-D5F8-4145-8CDF-F635D2C8F088" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28587.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28587.json index b4457951fea..88d8b2ec512 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28587.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28587.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28587", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:09.927", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:52:13.027", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "product-security@qualcomm.com", "type": "Secondary", @@ -38,10 +58,5157 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "770F3924-BE27-4BDE-B922-680B3C9753EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca2062_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54C350AB-526B-4681-9C37-DD508EFFB143" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca2062:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1ACBDBFC-796A-428E-9570-77E488FA1CB3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca2064_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E73670B4-1055-4C65-AD34-EB978ABB19A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca2064:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C774D66F-60C9-46B8-BE1D-B8D61EE5E844" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca2065_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C68AE99-4C8C-43AE-94AA-82632FD2BBE4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca2065:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E255A21F-EC50-436F-81D9-8B2AC56D9BCE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca2066_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6366F2ED-C6B7-4579-B304-C5B6DF951EB4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca2066:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09B688AF-E1A4-496C-924C-D6B725CBBE26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B1397F3-8CCF-4BBA-9F0F-A12E4F045754" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5888224-567D-4C84-BE6D-17B636BF506C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", + "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9EB615F-FD4C-450B-AB25-E936FD9816C4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BFC575E-594E-4711-94B1-2DC8D03B9AC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E02CCE45-27E9-436A-A49F-F92B1C9B0926" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59A4483F-3A2A-4C31-AB38-A3147CC7D55A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "90EF18E5-6D32-4A75-95B8-DF41A5373DEB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D3E2A00-5BFA-48A0-8DF1-DC33B2CA3DD7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc711_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A20DED6B-1CEF-4FC8-A6C9-176E34322D5F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc711:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8F9CA40D-1164-4A00-A722-EC1FBE839705" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "214A053F-D80C-4AD9-B4F1-83384095A3F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74EBA77E-69A5-4145-9BEC-CD39BA132309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*", + "matchCriteriaId": "163FE96E-DF5B-4B67-8EDE-44A5B9A8492D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FBB16DC4-CDC9-4936-9C6A-0ED8E1F6D056" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C9D1966-30F0-414D-BE75-0A14B12A1457" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD28C87D-1D28-4C84-BFE4-56EE3BF2C6B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F466A5BD-1912-4811-9A93-81555F101D46" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F92914E-16F6-4A25-9FEF-FB7CB3377132" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76E03AE9-2485-449B-BCFD-3E452BB01FC6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFCB9F22-57F2-4327-95B9-B2342A02E45E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DA2C3E1-E285-4CAD-9FA3-813C8EC436F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1894F6B9-31DA-44E8-AA28-064F73EBEE8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AA23845-D9F5-4035-8A93-F475D865586F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AEA324C-69CE-4AAC-91D6-6FAAE1B3FA77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7B5F5CD-CE26-4C93-9FED-F783947DBDA6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A558A868-1B67-48D2-8A94-FDEA7126FAE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7964A762-467B-47D7-865F-30D48A0AE47C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75AFAA21-0589-4C6A-9418-34EE8A61BBAD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C819454D-D413-478A-B78D-CFF6994803A1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14E3FE58-7F1C-4F5C-B62D-0CF124E14AB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFCB0BBA-3F81-4FCA-B3DE-190C46DA50DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33D393A6-4586-4416-86EB-F9D86DC3DED8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3991C516-4FBE-43D8-835F-413FE45BF73E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CF5EBB-B25A-4A76-B522-951F108263CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFA7BB42-305C-451F-92D8-0718DF68A012" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B93301-AFE8-409B-A8C8-6754BE5A0C14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B185412C-177F-48E2-87F9-1269E0FB8E31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FACA2BF1-85D3-447F-A08D-B90330A22550" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2ABA18D-82C1-4366-B1D7-DED42DD3D5C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3FB2972-94B6-4716-BA96-4B452BA3990F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57F4F872-094E-4E27-BB89-D8251FAFB713" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57B0086F-5F2C-4F89-AC53-D8429D6506CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:smart_audio_400_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB8145C8-D978-4047-9203-602E854E7290" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CCBF666-CB4E-44E1-9676-6891EDC73578" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C767AB6A-1A8C-406C-A600-96A816F44E2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "390D7CAF-6C0B-4438-AA7D-AEEE127F4D3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_460_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BB1FC5E-CF6F-4E54-B78D-C01AFD034903" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA3F11F3-C9F4-460D-BD77-1BFBCC1F0592" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25673A10-D99C-4F67-BDA7-9C2E4A70EF9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50906EF2-01F7-4E97-9F49-F892DF41CB29" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B23A89FF-9C94-40C6-B9B7-3E8354777916" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "873CD3BE-2098-4328-B350-A14453C44F1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_660_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE294B26-BBD0-455F-82B0-4605987B7DDC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37DF4D73-3ACC-41B3-8CA4-20DAECE6BFB7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_662_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE08D23A-2D0D-4472-8847-27B955F55165" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D0ED00F-1345-43AD-83C6-E979890B84AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92C28019-B57D-4487-B551-F7B53395C6E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C174F07D-0E33-43FD-9BAD-6C6D8B51B6A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47311B68-A07F-448B-99D5-9C92C8127A81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A930E317-7F22-4605-A85F-144921EEBA0C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAF50FDA-47FA-491B-BEAE-76CC38C18F52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9A2DA11-5E4E-4E36-923C-A2D3CC2F2751" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE7DFAD4-1D21-4A3A-9E8C-10F00AD7C403" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6B6B409-33F8-49CA-9A09-3AA97DCBCE54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_720g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F34AF35-8A0B-4B90-8AE6-EC961B7FEC4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A96C773B-B228-4A39-8CAE-AEA0EE6E5699" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "898FE463-291B-4C89-BEC5-8B99EA18CF23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C9940B4-672B-4D82-B904-80A3FC1DD4C2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11ADEB65-9803-4036-AAB4-B85E430B626D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD14F17B-FDC3-4B1B-9901-E40B783E77C6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8FD2424-599C-4137-9BB0-378F34B7AB3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6037264-BF88-4BCA-9F5F-B5D30587D9A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BABB84B3-C5BC-4AE9-AB6E-BA4BAF9FBECB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87ECCB82-B880-412D-A635-CA6F0B035F2B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "424743C4-CE74-4A02-835A-023C9DA0CFAC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14EA48BF-BD65-43B2-8DC1-D97F75AD6FE5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B86E317F-12BF-42F6-879B-88A85F7E3F81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4C68227-8928-41C4-A6B8-CD142C018AB6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "38E60ED4-9FB7-481E-915B-B7576566E0BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "194A4BD4-0DDF-49E5-AA89-40A5BFB71933" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72FF9732-40D8-4C12-8259-BAA16FAB5A56" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65B3644E-74B5-41BB-BA43-F3E588D152CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c_compute_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75F10C87-25C4-40A5-9B7E-904C2258CB3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c_gen_2_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC68355A-3202-4317-9767-26AFDD321789" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c_gen_2_compute_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF331899-4AA1-4D55-B494-4FA47BB97AE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D56B0CD3-138D-4197-84D5-2887C8FA40D2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_845_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E289B26-AF53-442A-9740-2F44D1F59DA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF26AC15-F805-4FEB-9CFC-BD530FA114F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17A6D87A-544D-4B8E-884A-0117C499DD8D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9F4285-1F09-40CD-B1AA-84B406FD6A71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8623DD44-DFDD-442D-9789-11A527A450A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22303AD4-779C-45A3-8F33-3864C45E4328" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EC440D-D420-4477-8F14-427245B80631" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41446A77-6EF3-4570-BAD2-4C761A2C4E7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "448C401B-EF07-4385-A7B4-123D7808F64F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22A78236-5965-4F65-9001-3FE7FF6D27E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "414C5C1D-A5DA-47C7-B6C9-3564DD4DD911" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01CBD543-635C-4C57-87B7-55DD3BA3C1A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A7272B6-AADB-4CCD-B041-66170C313C76" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-ad_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9AEC3A05-8F33-4028-B7A8-9EBA236FDA9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-ad:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D997EED-E10B-446E-8B51-5D3C611E0F62" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-ad_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A27DE47-C6D7-4E24-9041-08D8444DDAD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-ad:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBDF16D-8B58-4031-9C51-424D155336F5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "039AEC8D-9372-4737-B846-CBF1F23ADCAA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-aa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4306FDC5-6F33-4462-B5B0-27125DFD9F5A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "073ED3B4-6ADE-4E7F-A797-523DA85AF09C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "156A1CD6-2827-4D0C-B8F4-FB0C7774CD75" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180x-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B28A559B-EA1A-408C-9C92-8CF8A62397CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180x-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F22559E6-CB6A-48BD-8E30-7B4E2CA7B7A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8180xp-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00CB649A-DA70-4713-98B0-883CC404E5DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8180xp-aa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F8F9C8A-6E84-40C9-A0B9-21AAF60E43E7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_sc8280xp-ab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19CDBCF0-01C7-4D9D-A896-283C3B21512B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_sc8280xp-ab:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79D59603-1A41-4CE3-A5C3-5A2EBD1BA1A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB6053F0-5E34-458A-B084-078E4D4F4021" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF9740EB-F82E-42EA-993E-A393B05CC6BB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "022A5532-03F7-4FB8-BA0D-4221178C9486" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_4g_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C8F12FE-0057-4A13-9A7F-D12C114ECEF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_4g_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1271B0C7-2D91-4129-9B58-E6689DD68C39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BA4BA00-C8D1-4DAC-8030-CB5EEC7D4591" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDC270A7-205C-41EB-A2E5-2A381A16BFBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E1753FC-F3CD-4B50-886D-8E16D9301A84" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3E20681-4FC4-46E2-AF77-BCF03BC8E77E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E685A5C-870C-41E9-91AA-7AA7535C4D85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_400_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8F52FE7-2C9C-4908-A578-2230ED6A1505" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D6C6B2-36DC-4D0D-AFF8-2108A090A78D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28FEB3B1-F641-436D-AC4F-3304C37167C4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28588.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28588.json index ff7ec209112..04dfbd3be2a 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28588.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28588.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28588", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-12-05T03:15:10.103", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:00:54.277", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "product-security@qualcomm.com", "type": "Secondary", @@ -38,10 +58,5806 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEDA6CA-A0FD-4A72-B856-C8E65AC86902" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D29295A-7183-46BE-B4EE-F891D1C17ED9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDCB8499-A096-4633-8506-63C0A227A958" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:apq8064au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEE2C7C3-E928-4466-B537-0D1826E2223C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C8807E9-5972-47E7-8B39-2E4D68C7B79E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8108:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57963412-14B9-4C0D-AA0D-6928445DB808" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8209_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29F64FA7-5EA1-4C91-B409-4A0E966FBD26" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FBCA5AB-07E4-404E-A278-28F6004D2126" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8608_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99AE9AEA-4D9F-4879-85F7-405279EFE5ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8608:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDED3AA7-576C-4437-A466-D627698F4242" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B0F8ED6-EAE7-44EA-A8C6-F5AD408261F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886CF046-E1D9-4FD4-AC02-EAB61C3F70FD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "059486E9-3F99-4C65-A763-470564EDAF2C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "966CDA56-809F-4FF4-909D-0DD92F44CF67" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C90747B4-2CC0-4816-A994-58E00F5ADA05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00FE294D-4BE0-4436-9273-507E760884EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*", + "matchCriteriaId": "424CB795-58E5-43A4-A2EC-C563D93C5E72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93ED74CE-6BF2-4983-8780-07D5336745B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", + "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "214A053F-D80C-4AD9-B4F1-83384095A3F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74EBA77E-69A5-4145-9BEC-CD39BA132309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*", + "matchCriteriaId": "163FE96E-DF5B-4B67-8EDE-44A5B9A8492D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FBB16DC4-CDC9-4936-9C6A-0ED8E1F6D056" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F466A5BD-1912-4811-9A93-81555F101D46" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F92914E-16F6-4A25-9FEF-FB7CB3377132" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02BA009F-24E1-4953-BA95-2A5BC1CDBDBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76E03AE9-2485-449B-BCFD-3E452BB01FC6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFCB9F22-57F2-4327-95B9-B2342A02E45E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DA2C3E1-E285-4CAD-9FA3-813C8EC436F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F68F9B33-6BA5-46E1-A370-547CDA626985" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D13E375-0562-4263-8452-53E117F14E83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_205_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8F2B255-04B5-4982-8018-F43EDD4F7912" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_205_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4DE45CB-E697-489D-BFCA-1BBA48FF0846" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_215_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E92DB42-A805-4280-A8F4-F6A7489094F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_215_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A8778EB-BCE0-4099-BDC8-667903F1446E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AEA324C-69CE-4AAC-91D6-6FAAE1B3FA77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7B5F5CD-CE26-4C93-9FED-F783947DBDA6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F357160-9EF0-4150-893B-746289C071AD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc5_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3429F7D-C5C7-488E-8E32-518838C51621" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb3_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85FE8AF5-3747-40D0-9DE3-5A77E05251C6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb3_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB7865B5-FAD2-4FC3-B708-0EE4AA4E4EB1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA73E75-F339-49BA-B1F6-619E4630DE92" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb5_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DA6E940-1059-4EA2-8225-0F754FE9F50F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A558A868-1B67-48D2-8A94-FDEA7126FAE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7964A762-467B-47D7-865F-30D48A0AE47C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "589C1001-E9F6-41A6-BCC8-A94A3C97F2E6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33D393A6-4586-4416-86EB-F9D86DC3DED8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9043720-6B49-4305-BB4F-C88CCB6D89E9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd626:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC8F19D3-F322-4CDC-83C5-A9F7F1777DAD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3991C516-4FBE-43D8-835F-413FE45BF73E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CF5EBB-B25A-4A76-B522-951F108263CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B8DA94C-23A0-4C99-9F05-144B9B5224B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39E10E22-E7CC-41D6-80F3-030083F45645" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1497D052-884E-496B-BEF8-6904A25125ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "589F4888-28F6-4ECA-860E-8054C2A8C419" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC4DA7EA-DB81-4C71-A875-2612D8D7D726" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*", + "matchCriteriaId": "48F26F64-98D4-420A-8918-E5E56ABA1D47" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFA7BB42-305C-451F-92D8-0718DF68A012" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B93301-AFE8-409B-A8C8-6754BE5A0C14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B185412C-177F-48E2-87F9-1269E0FB8E31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FACA2BF1-85D3-447F-A08D-B90330A22550" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2ABA18D-82C1-4366-B1D7-DED42DD3D5C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:smart_audio_200_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE9BAA26-7377-4D96-965C-1CD54FD487B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:smart_audio_200_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "306C7C27-1363-4FF6-AC71-BB8DB908D058" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57B0086F-5F2C-4F89-AC53-D8429D6506CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:smart_audio_400_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB8145C8-D978-4047-9203-602E854E7290" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:smart_display_200_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C23C4E41-66D1-41A5-8814-0F436902E9E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:smart_display_200_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40B2A51B-661C-45B3-AC29-BFF7C0636ADE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_208_processor_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CC78837-E44B-4D03-A9B1-C3494D823207" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_208_processor:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF94E560-681D-48E7-9429-9B4BDB89393B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_210_processor_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C8490C5-0F0C-4AC6-A80F-06EF08E8C39E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_210_processor:-:*:*:*:*:*:*:*", + "matchCriteriaId": "680B7C89-F3C0-49DA-A73E-CCDCF0A71CF0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_212_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70E745D7-3E43-42B1-9CBE-CA53846D0660" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_212_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13DA9023-07FE-46B5-9F3B-D6A2C5AED241" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CCBF666-CB4E-44E1-9676-6891EDC73578" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C767AB6A-1A8C-406C-A600-96A816F44E2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_425_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58E5A10C-4B4C-48F7-9973-999726108CAB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_425_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E657C793-12DB-4FCB-91C9-11DB09CA6E12" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "487D6D28-F007-4726-AB69-F68B1FF4CA3E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8FE3BF-8A02-4928-BA5F-BF2457D2C8CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_439_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60D19880-121E-43DD-98C5-502DEF7B51A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_439_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB7F9CDC-16EE-405B-AFC8-A691ECAE864E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "390D7CAF-6C0B-4438-AA7D-AEEE127F4D3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_460_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BB1FC5E-CF6F-4E54-B78D-C01AFD034903" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA3F11F3-C9F4-460D-BD77-1BFBCC1F0592" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25673A10-D99C-4F67-BDA7-9C2E4A70EF9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50906EF2-01F7-4E97-9F49-F892DF41CB29" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B23A89FF-9C94-40C6-B9B7-3E8354777916" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_625_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6647DA1-A755-43DF-943B-E724F83A2216" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_625_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A0D9023-3BAD-4C7F-89B8-B79808071E26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_626_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CC25002-D6FA-49B3-A1B7-DC89CCC1D4FE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_626_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12A226AA-88BE-488B-816A-A29E52190B4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_630_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "531A9325-790A-4D7E-BFF2-EB1808C719D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_630_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1AACB4E-70A7-43ED-953D-911D2450C946" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_632_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C96DA9DC-A75A-4E73-B51C-4AA059DB81C5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_632_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8323F3F2-010E-48E5-BFFF-A9896133D102" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_636_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C558A35-E8E3-43CD-BAC5-C665875D3E60" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_636_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F23BF59-9FB7-49D6-846D-52263747E69F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "873CD3BE-2098-4328-B350-A14453C44F1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_660_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE294B26-BBD0-455F-82B0-4605987B7DDC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37DF4D73-3ACC-41B3-8CA4-20DAECE6BFB7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_662_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE08D23A-2D0D-4472-8847-27B955F55165" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_665_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9151A7D-4A02-4EDD-830E-3408BBB2B0C3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_665_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73D551AC-1008-444B-8A69-CF8CE60942FF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_670_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9871C72-4B99-43E5-B389-EB26996B08DD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_670_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "586E725A-B3F6-4C4D-AE46-0D76A0C0D91E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_675_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABF96A66-FECF-4D2F-94C5-7BFC746789E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_675_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28638583-F98D-4B88-AF50-A10642D6A105" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_678_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1B3C6D8-F06D-48DE-9127-0E574578E501" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_678_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A933F383-717C-4D7B-836A-76042F55488F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D0ED00F-1345-43AD-83C6-E979890B84AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92C28019-B57D-4487-B551-F7B53395C6E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C174F07D-0E33-43FD-9BAD-6C6D8B51B6A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47311B68-A07F-448B-99D5-9C92C8127A81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A930E317-7F22-4605-A85F-144921EEBA0C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAF50FDA-47FA-491B-BEAE-76CC38C18F52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9A2DA11-5E4E-4E36-923C-A2D3CC2F2751" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE7DFAD4-1D21-4A3A-9E8C-10F00AD7C403" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_710_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEAB1AE-53FE-4641-A2BB-4E1449A76E8C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_710_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E92D896-80E5-47C6-A752-F19F1CB8005D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6B6B409-33F8-49CA-9A09-3AA97DCBCE54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_720g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F34AF35-8A0B-4B90-8AE6-EC961B7FEC4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAE7612E-5C12-467E-95EC-90D0A984E086" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D76005A3-22FC-45C1-A01A-8640F030E6A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E454506E-21BE-4BC9-91B9-21DC2AEA63E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D06996C-0832-4406-9581-1327345E95B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_732g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0E3DAEC-1C6C-41D4-867D-A246C51A7F08" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_732g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4E25E7B-7391-479A-AE10-E593ADF7A5B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A96C773B-B228-4A39-8CAE-AEA0EE6E5699" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "898FE463-291B-4C89-BEC5-8B99EA18CF23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C9940B4-672B-4D82-B904-80A3FC1DD4C2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11ADEB65-9803-4036-AAB4-B85E430B626D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD14F17B-FDC3-4B1B-9901-E40B783E77C6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8FD2424-599C-4137-9BB0-378F34B7AB3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6037264-BF88-4BCA-9F5F-B5D30587D9A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BABB84B3-C5BC-4AE9-AB6E-BA4BAF9FBECB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87ECCB82-B880-412D-A635-CA6F0B035F2B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "424743C4-CE74-4A02-835A-023C9DA0CFAC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14EA48BF-BD65-43B2-8DC1-D97F75AD6FE5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B86E317F-12BF-42F6-879B-88A85F7E3F81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4C68227-8928-41C4-A6B8-CD142C018AB6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "38E60ED4-9FB7-481E-915B-B7576566E0BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "194A4BD4-0DDF-49E5-AA89-40A5BFB71933" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72FF9732-40D8-4C12-8259-BAA16FAB5A56" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_automotive_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22B3AB46-81F4-4C45-AF66-C8B36A175685" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_automotive_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A8198E0-C95A-4433-9EC0-F544CAA90251" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81FC1C9D-D494-4426-93FF-A774D68554D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_835_mobile_pc_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B4837E0-EFF7-4546-918C-03551E03F6BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D56B0CD3-138D-4197-84D5-2887C8FA40D2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_845_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E289B26-AF53-442A-9740-2F44D1F59DA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF26AC15-F805-4FEB-9CFC-BD530FA114F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17A6D87A-544D-4B8E-884A-0117C499DD8D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9F4285-1F09-40CD-B1AA-84B406FD6A71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8623DD44-DFDD-442D-9789-11A527A450A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22303AD4-779C-45A3-8F33-3864C45E4328" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EC440D-D420-4477-8F14-427245B80631" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41446A77-6EF3-4570-BAD2-4C761A2C4E7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "448C401B-EF07-4385-A7B4-123D7808F64F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22A78236-5965-4F65-9001-3FE7FF6D27E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "414C5C1D-A5DA-47C7-B6C9-3564DD4DD911" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01CBD543-635C-4C57-87B7-55DD3BA3C1A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A7272B6-AADB-4CCD-B041-66170C313C76" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB6053F0-5E34-458A-B084-078E4D4F4021" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69D1567F-D669-4415-9A08-110221EFA6BA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x50_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF808C56-AD46-4351-9A46-6A2B6AAAB5BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1E1B7FD-39CD-42AB-A113-2AFB25B5F85B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C93EECE3-7A8A-4B58-A674-134040CE43FE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF9740EB-F82E-42EA-993E-A393B05CC6BB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "022A5532-03F7-4FB8-BA0D-4221178C9486" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BA4BA00-C8D1-4DAC-8030-CB5EEC7D4591" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDC270A7-205C-41EB-A2E5-2A381A16BFBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF839E24-6542-4C5D-A1B7-FD3BA00683CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9F12284-93E0-482D-9D35-EB38BA7D6C6D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E1753FC-F3CD-4B50-886D-8E16D9301A84" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3E20681-4FC4-46E2-AF77-BCF03BC8E77E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_100_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42F94655-7876-42AF-828E-E1B6DC671F46" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_100_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08AB0C49-042F-4C18-8122-54E0994300F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_200_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9804EF5F-92E2-42F8-A714-42A091E16CC7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_200_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89BEAC30-92AA-4733-B45F-E4E5127DD5A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E685A5C-870C-41E9-91AA-7AA7535C4D85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_400_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8F52FE7-2C9C-4908-A578-2230ED6A1505" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2503805B-B2A6-4AEE-8AB1-2B8A040702BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3AD370C-2ED0-43CF-83D9-50DC92A01CA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DAFD64E7-3F13-4DCA-8C46-6E8FE0C6F798" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "044A14FB-64F6-4200-AC85-8DC91C31BD16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9590EF1F-E821-4525-943B-4A315ACAEFFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A7D32B3-325E-4B1F-8649-3D0071396BBA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F66A898-3C7A-4D44-86BD-89129F04E654" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B612B044-C7D1-4662-AB2A-5400E34A3CA7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28604.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28604.json new file mode 100644 index 00000000000..0c0fee05e81 --- /dev/null +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28604.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-28604", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T17:15:07.817", + "lastModified": "2023-12-12T17:22:30.567", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The fluid_components (aka Fluid Components) extension before 3.5.0 for TYPO3 allows XSS via a component argument parameter, for certain {content} use cases that may be edge cases." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/sitegeist/fluid-components/blob/master/Documentation/XssIssue.md", + "source": "cve@mitre.org" + }, + { + "url": "https://typo3.org/security/advisory/typo3-ext-sa-2023-003", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31048.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31048.json new file mode 100644 index 00000000000..8414ab85d5a --- /dev/null +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31048.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-31048", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T17:15:07.867", + "lastModified": "2023-12-12T17:22:30.567", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The OPC UA .NET Standard Reference Server before 1.4.371.86. places sensitive information into an error message that may be seen remotely." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-31048.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/OPCFoundation/UA-.NETStandard/releases", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/OPCFoundation/UA-.NETStandard/releases/tag/1.4.371.86", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-334xx/CVE-2023-33411.json b/CVE-2023/CVE-2023-334xx/CVE-2023-33411.json index 5923d183bf4..a4db587a00d 100644 --- a/CVE-2023/CVE-2023-334xx/CVE-2023-33411.json +++ b/CVE-2023/CVE-2023-334xx/CVE-2023-33411.json @@ -2,23 +2,10206 @@ "id": "CVE-2023-33411", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T18:15:07.393", - "lastModified": "2023-12-07T18:30:55.033", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T18:53:04.930", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A web server in the Intelligent Platform Management Interface (IPMI) baseboard management controller (BMC) implementation on Supermicro X11 and M11 based devices, with firmware versions up to 3.17.02, allows remote unauthenticated users to perform directory traversal, potentially disclosing sensitive information." + }, + { + "lang": "es", + "value": "Un servidor web en la implementaci\u00f3n de Baseboard Management Controller (BMC) de Intelligent Platform Management Interface (IPMI) en dispositivos basados en Supermicro X11 y M11, con versiones de firmware hasta 3.17.02, permite a usuarios remotos no autenticados realizar recorridos de directorio, revelando potencialmente informaci\u00f3n confidencial." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:m11sdv-4c-ln4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "BB4C5A73-CF7A-4891-90A0-ECC1BEEEC8F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:m11sdv-4c-ln4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA419264-0203-4851-83E2-6C8D9EC10CC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:m11sdv-4ct-ln4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "2B119A07-8996-4EF8-9BCA-6F0EFC78ABA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:m11sdv-4ct-ln4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47CE6672-50D3-4F34-86A9-75B81CDF2A9F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:m11sdv-8c-ln4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "A61610F5-C653-4731-8B42-8C70BDF7505E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:m11sdv-8c-ln4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FC8BBC2-9D1B-4242-A850-48BA13F3BEC3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:m11sdv-8ct-ln4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "1A7BE31C-1C28-4937-BB45-46C978ADC335" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:m11sdv-8ct-ln4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704A622A-9144-4673-8DF2-651B7C70450B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:m11sdv-8c\\+-ln4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "03497EA2-5051-4B65-A851-C95DD0C45C84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:m11sdv-8c\\+-ln4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C183B42C-0B42-4C80-9FB2-0191B06A754B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:c9x299-pg_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "F8865673-289A-4E7F-8DA5-C707957AE5D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:c9x299-pg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43A67415-C05D-46F8-8C82-381A4763610C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:c9x299-pg300_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "CA8F7797-378F-4BB0-A172-D79E01891F5B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:c9x299-pg300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F049DED7-6A11-4B35-9318-7CBF9A4669DD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:c9x299-pg300f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "62CE5298-8933-42C7-9538-0CF7152E086E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:c9x299-pg300f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BBB5FD13-BCEB-4E0C-999A-B8DC68073B9E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:c9x299-pgf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "FCDC20AD-D292-472D-A725-C99D90D696D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:c9x299-pgf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0670C747-49E6-4358-9989-CBF08D20BDD1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:c9x299-pgf-l_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "9C918A3A-2BCD-4F62-9EBA-13C8F3C016F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:c9x299-pgf-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29A2FC6A-8873-4B9F-A1B4-B88429A135F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:c9x299-rpgf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "861476F5-E684-41AE-9E33-62D22A18B064" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:c9x299-rpgf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AC82579-210A-40F5-A12E-2829FF0B2DA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:c9x299-rpgf-l_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "6E3B530C-3664-4EE6-B15F-4031E91893C2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:c9x299-rpgf-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "595457C2-0C73-457F-B571-B9B694062D7E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:b13dee_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "97C2F1CB-98A2-487C-8E9D-75CCF36B1C5A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:b13dee:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3411564B-FCE5-4819-B226-65F7B3152E32" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:b13det_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "2FBB7068-B11B-43FD-8866-71F3484248EE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:b13det:-:*:*:*:*:*:*:*", + "matchCriteriaId": "67D98A72-B2DE-40C8-9491-B7543677A266" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:b13see-cpu-25g_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "DD8AAC7B-19F3-43D4-89AD-A5F717374067" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:b13see-cpu-25g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1B07E94-29D2-4DAA-9B34-3573FEE22C7B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:b13seg_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "4B0D0D78-832E-41E6-84B8-C651C94749EB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:b13seg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6F157CA-D9A4-4EFA-8C0E-D644E9E3C8A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13dsg-o-cpu_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "6BB12538-3CEC-4A7C-8E9A-DE7E5079E426" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13dsg-o-cpu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA579368-7624-46E8-93A4-596A18538BD2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13dsg-o-cpu-d_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "6552B70F-94CA-4AEC-9519-D2952A0B3B3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13dsg-o-cpu-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E0F442E-B787-43EA-8FC7-078935708514" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13dsg-om_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "66D2261E-3CFE-40A8-8C80-DE4B0F70CA33" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13dsg-om:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B93C26E1-EC4A-4B55-BC6C-4DBB3B29F548" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13dsh_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B066F428-4D87-4233-8C49-475ACEE4A861" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13dsh:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89B92EB3-1B95-4095-BBEA-B1DBDB3B0FA2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13sae-mf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B275D084-1081-4891-B8A4-CFEDA687593C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13sae-mf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F556ECED-E349-4D22-B5E6-FC7D5E70BEAF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13sra-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "3B22FBD4-BA6A-418D-A835-93B61F08B085" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13sra-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87E5769F-2994-4D71-BA3F-F84600F888A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13sra-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "0B25B157-9AB1-4FBA-8500-01AC35A91911" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13sra-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A6CDD62-FD70-4219-A8B3-3C0F01C3F1C1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13srd-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "87BA83AC-0BE8-4E0A-9A55-6B7E976153BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13srd-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "675A5F85-E7EF-40B4-A7B0-1C4FA83E20F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13ssf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "C5522D20-411D-4673-AEFF-91F872050CCF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13ssf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63215A82-9A56-4901-B5AE-90633D64E1C1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13ssh_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "65CFBF7E-4450-495A-8E29-BB814EE5474E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13ssh:-:*:*:*:*:*:*:*", + "matchCriteriaId": "10D2DCA1-183A-48FE-8F59-B1A67B0576DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13ssl-n_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "772C085F-F428-48EE-B559-B77B891BBCB1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13ssl-n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "364216C0-0D65-40A9-B35B-36B1A9228A56" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13ssl-nt_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "1A37D71E-3B24-4890-975F-B1807ED531A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13ssl-nt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F06F7E1B-6235-4B48-88AA-B9833AE75862" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13sst-g_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "098BEC3C-6859-454A-B466-CCD975C6EE12" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13sst-g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "005B9DC1-4115-4773-8F45-F4FB555A03D1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13sst-gc_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "AF2A14DE-1F9F-4D01-9CB4-977C8D71597A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13sst-gc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C340BFE-2FB0-4BF6-A2B2-B8526DBB1D63" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13ssw_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "917A23DF-FCEF-4FB6-ACDD-8077A2091816" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13ssw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A611C4A-57C2-48A2-B3E8-4AC46242CD31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13svw-n_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "BC575B82-D63B-4FBE-A18D-BA9A7615F66E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13svw-n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB3B6BEB-65D4-4D08-A2A0-5B91C5C93757" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h13svw-nt_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "50B780CA-71F0-479F-B1C3-4573129883E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h13svw-nt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8F0AA1B7-A15E-4570-A47A-4734DAAFC9F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13dai-t_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "3450B80D-F902-4A9B-AC94-474C6A1BEA06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13dai-t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75EA52CF-A1A2-4A09-849A-423F6E47A485" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13ddw-a_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "4FAFFA34-4335-4A0E-BEAE-A9502CD47265" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13ddw-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "558BAD24-8C02-4A7C-B10F-48059C810579" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13deg-oa_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "571760F1-A792-4319-9592-19368FF462FE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13deg-oa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FAD54D8-480C-4BBA-8A17-5557BDA7CED0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13deg-oad_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B4903E9B-8C41-42C2-95FB-8171EA6D6C3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13deg-oad:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D661D4FC-874B-4020-B03B-A7DC3B82B0E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13deg-pvc_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "6C305075-2344-408D-A569-7457434C8A9A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13deg-pvc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD036B36-43BA-451C-B371-A04C41FBEB65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13deg-qt_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "606D0988-D3C0-47CE-A8F4-5440243416AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13deg-qt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EF5517B-B6C5-47CA-929F-D4B95827A902" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13deh_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "2D119D5D-AC6F-4606-9075-807201258470" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13deh:-:*:*:*:*:*:*:*", + "matchCriteriaId": "852917B3-AFF7-4465-873C-5D5A10F7966D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13dei_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "E6E28F78-6BD7-4E2B-8BA3-2637FEB09DBD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13dei:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A18D05BE-FE30-4041-A250-1F26825C591C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13dei-t_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "9AB27667-74A7-493E-8B98-4B1836779245" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13dei-t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "841C9D0B-F0AF-411F-BA06-2432BA24B275" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13dem_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "1AF9BD95-9BA9-4949-A7D5-028BE528E81F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13dem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3A34C5B-89B4-4DC2-A8CE-9257B450D79E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13det-b_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "76182A30-365B-4183-A3D6-24B43A1DD5A1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13det-b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBFC9589-DF31-4D9C-B50E-11503F99C618" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13dgu_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "00D7B8E2-ECC7-433C-9BF8-30DB2DD9C904" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13dgu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70E0611D-F0DA-44DB-8D43-C9249B6106DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13dsf-a_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "979A6750-1575-4E5F-B440-620D8623F0A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13dsf-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE647392-5307-4D6B-BAC0-4533BC4A4801" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13qeh\\+_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "FAB88534-4CDD-463E-8004-688F16BA3C03" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13qeh\\+:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6560D7C5-8D62-4634-8E2C-CB293BCE3126" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13sae_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "7BE8C5BC-7C49-4139-9D21-78463D7DC775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13sae:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F36733DC-9633-41C9-BEB6-AA1630FCB9DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13sae-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "45F2F46A-C272-4187-BC92-248F7BEE5DCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13sae-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6AE36E6-C235-4524-A5AA-C26AD5B8AEC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13san-c_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "E9FE5298-F64E-4333-A870-C9D916562250" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13san-c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74BCA069-8DFA-4441-AA2E-2861C01A4A6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13san-c-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "1460E0F4-1786-4C80-AAD3-0DC3229B0863" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13san-c-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B2C7E3F-7E79-409C-AA7B-29361EB96516" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13san-e_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "3B35449E-A228-46C0-8FB4-AC1052ADDB7C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13san-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3E8F060-82A0-49AF-AC11-69ED96403CA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13san-e-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "0554C8B7-A7C4-4850-9C2E-3DCAB3530AD0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13san-e-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9551D604-528B-4942-B207-37E851F64690" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13san-h_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "00FC5F1A-ACB3-4F63-B276-B92EAE871ACC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13san-h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87F176BE-5099-49B2-B658-7A8F2BFF793E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13san-h-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "F7BF68EB-AFC5-49C7-BF62-416E7EFD638D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13san-h-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3378D8AA-EB40-4F73-83CD-765FA4A4DC6D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13san-l_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "1729755B-724B-4D01-B858-60216C580CD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13san-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96CBF59E-7865-41A5-8952-512FD13F1CD1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13san-l-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "2390C99E-41A6-4A56-B89E-15041AEEF467" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13san-l-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66765BAD-8F07-492C-8740-25FBC4DB0DEB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13saq_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "DAA5324E-0383-4022-9E85-36DEF93C3CC4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13saq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B8AD410-AF0F-42E0-B60A-71BCBB6BC3BF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13sav-lvds_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "764B379D-46A1-49FA-9BB7-C024F3F165CC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13sav-lvds:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C2F5EDC-CFD5-41F5-9EAF-FB5CB6E9764F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13sav-ps_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "00ED42A1-6577-48D3-ABF0-B3ECA79023F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13sav-ps:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE3C2846-5816-4773-B73D-4B36A6B24542" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13saz-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "0C33B135-B212-4F75-A0B5-615CB437B782" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13saz-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A97110CA-8623-4EF4-90DE-9356D5E9311F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13saz-q_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "3B994482-2AC4-40DE-92BB-81D50EC62073" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13saz-q:-:*:*:*:*:*:*:*", + "matchCriteriaId": "909438EF-7652-4184-9DB8-CB2E45B300A3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13sedw-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "97AA39B0-E63B-4CCE-82D2-092A075D6490" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13sedw-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46BE300F-CE76-45F4-BFBF-6CA857E593CB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13seed-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "A793DE0A-83C2-4EC1-AE60-C77F2BBDD73C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13seed-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "241D4911-2240-42CD-8F52-F7B66CBE0CEA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13seed-sf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "EAC88C3E-9A6D-43FC-AE3F-D1630D3B00EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13seed-sf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3C13F43-A756-4395-9FC9-CF4DF74B3393" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13sefr-a_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "4C41416B-7DC7-4CE1-B269-BAA9EE844C2E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13sefr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "509CD460-D28B-4267-8E6D-FAC4F2332AD2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13sei-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "A8277A30-EB1D-44B0-8B86-0EB1F9FE1238" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13sei-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95E7BBBC-A310-4F66-874B-1A7A8ABA1BD4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13sei-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "6326D9F2-F77C-4EBE-9238-93CE8977F7F5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13sei-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403DBCD1-9A34-48CF-B610-62E6369118C9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13sem-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "A4C3FE24-FCD0-4376-BF5A-58A9559EBE67" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13sem-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BBD8D5E0-0545-47AA-9A16-566D7EC2CD8C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13sem-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "42D566FE-B728-499C-99AC-197C2A8B8647" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13sem-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9825E801-7F77-479B-B8E6-751AAD67E8DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13set-g_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "65FF4FE8-BC6B-4158-9C77-E43B01C382D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13set-g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E19D0CC-9619-4F17-B7B8-CD94A9583682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13set-gc_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "4BB74893-3F83-4B5D-AA17-AA773C58C2E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13set-gc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "625C3534-DE49-4833-AC7D-4B12A3B7C4D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13sew-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "3445CA19-640D-4493-A0C2-A36AC853D2DE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13sew-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "996E89B5-0F5D-49F1-8F1A-CFDD698B6709" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13sew-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "DF6C8519-1FFD-4BD8-9FB5-BD8124B1DAA6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13sew-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A880465-2345-4807-832A-C277A3B12224" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13sra-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B40FE641-15F4-4BCB-9438-9D87504C36B5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13sra-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE31EC0-1E3C-404B-8202-451F7708DB85" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13srn-e_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "93700262-0646-45A4-8D10-46F9F7167D78" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13srn-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F6E7176-6F39-406C-BAD4-E244CA46E8CD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13srn-e-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "79E512EC-73A2-499F-8EF3-786DC0E2CAB7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13srn-e-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E95DFD86-177C-405C-B738-08A22770BFFD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13srn-h_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "EA02E576-E217-4971-8E5F-A970C877F35D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13srn-h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "90A4FB92-627A-44BC-8ADC-BF1AC00DA889" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13srn-h-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "F7DCB5B5-5C83-4C67-946B-71C705418FFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13srn-h-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF9C1975-29A8-44D9-998A-01770D5FE776" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x13swa-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "07524755-F1AC-4185-9494-91C1361E3000" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x13swa-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2EA1F0A-9282-4BBA-8752-FE0E14B5A9F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:b12dpe-6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "11D3CA26-0BB8-49E6-B2F7-0ABFD1036220" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:b12dpe-6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE507AF6-C51D-41F9-B7D3-97F5E2C92EF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:b12dpt-6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "60436593-5D82-4956-AE33-31BBB0F03B54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:b12dpt-6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D73CE868-F4FF-4645-AD2C-5CC8064A1632" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:b12spe-cpu-25g_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "EAE6D577-66CB-48FD-8B07-8ADCE788BAB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:b12spe-cpu-25g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D8065D-2076-4DFA-9156-486EC6DC3521" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12dgo-6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "5021B9F2-BE6F-4EC5-8820-CD7B79DB44F3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12dgo-6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BE72168-E2BE-4E5D-99A3-E5874FB027E3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12dgq-nt6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "039BEF08-D29A-441A-83F9-3918895446FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12dgq-nt6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9BF14BD-5E65-4C3C-ABD4-E7D26AF05D25" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12dsg-o-cpu_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "22789C3E-DCF9-491F-9F3D-FCEFB9700655" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12dsg-o-cpu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55A8A11C-8FE3-4789-A517-F1E14FC2710B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12dsg-q-cpu6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "A7A1BB17-DCB8-492F-B560-30BC66E3ED6D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12dsg-q-cpu6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44FE8EFA-41DD-44FC-9786-3AFC6AB828D1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12dsi-n6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "D666C96E-79E9-4932-AA62-22B856379AD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12dsi-n6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9892D863-F361-4511-BB61-61398CB8360F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12dsi-nt6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "CC212365-8347-4152-B789-1919B7766469" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12dsi-nt6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9E11E3D-B003-489B-BCF2-76CEB30EB6E4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12dst-b_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "473D1854-189A-4644-B3BA-69F812522F58" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12dst-b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DF3E668-0CF8-404E-8A08-EB2CCB1D2489" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12dsu-in_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B2023BD6-2172-4F45-8D14-BF64FA9E345B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12dsu-in:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F019FB2C-63BC-417A-81E1-E852C052007C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12dsu-inr_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "5ED2FBFD-5B1F-4CC7-8B5E-6C65FD5A9E7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12dsu-inr:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2DB5BC9-8633-4148-9EF9-D9564B184722" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12ssff-an6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "A04CD567-D448-4C4A-AC98-E908726CD7D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12ssff-an6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CDF0E3C-8205-4179-B0BC-CDC00BE5C3D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12ssfr-an6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "999F91F7-3C2B-4807-93BF-7D4ADB5A7C16" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12ssfr-an6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA767312-A7E3-4BE5-AF2F-D2B69756160F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12ssg-an6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "CB34D33A-1361-4BAB-8603-31E1C0B0B8D2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12ssg-an6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD0EE294-07EE-4ACD-A189-2F48667BD901" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12ssg-anp6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "72FF16D1-A625-4A0D-8541-0C51DBDB9A64" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12ssg-anp6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1558880B-8A49-4212-AEA9-A525FB454E8D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12ssl-c_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B09A2193-C82B-4F5F-B058-ACF5BF590F6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12ssl-c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C78D0B4-958A-4874-8540-9C622BEC5444" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12ssl-ct_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "414D34DD-39B3-43E0-876F-B297897F3F29" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12ssl-ct:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50943BA5-0DAC-4246-9287-CA9DD9D05F9F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12ssl-i_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "AECDD073-7DE1-48A3-ABD6-5635EABD7097" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12ssl-i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B9CEA83-ADAF-4659-88E9-D0056EB699BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12ssl-nt_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "165ED5F8-50AB-468B-B07D-85A7E8B26EA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12ssl-nt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D1F99BB-1F02-4CA1-8C5A-A69F4674D4B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12sst-ps_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B0736CC8-B905-403B-8BFD-141BF8613752" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12sst-ps:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF330665-9B9B-4B0C-92C8-427D4B7A77AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12ssw-an6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "26F41B3C-3B97-4A1E-8AD5-21FBEC32FB18" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12ssw-an6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCBFB445-EBAF-4A9B-A2E7-9B88CF4A2EB5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12ssw-in_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "5127B859-8891-496B-BD31-112D1EE080B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12ssw-in:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FED457FD-AB0F-4829-9C4F-C00F9127E293" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12ssw-inl_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "AB6A08EB-A53B-44BE-ADF2-C59ADD078EC5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12ssw-inl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "30940045-B6F5-4AB8-A761-234A9049D48D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12ssw-inr_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "2F46E654-5707-4D7E-A7E1-B0BE9CD73623" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12ssw-inr:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C80067D5-61BA-48ED-B17C-5EAB04AB0CB5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12ssw-nt_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "D4CF1A5E-9B2C-4BEA-A366-BC1897B2C184" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12ssw-nt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A63737C8-F51D-48B9-A926-161175424379" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12ssw-ntl_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "E1793679-E7A5-430B-8DEC-20E74E05954A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12ssw-ntl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B3555A1-5FFB-416D-ACDE-1458E655EE5C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:h12ssw-ntr_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "404D7E94-878E-4600-9EB4-CE17667D2911" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:h12ssw-ntr:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34E1FE8C-4916-4BCB-BE13-FFFFD1EFC611" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dai-n6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "AAEA8DAE-D366-491D-ADB9-F4BB78C4573F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dai-n6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CC667F4-B046-40FD-8F10-0BAD14B41430" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12ddw-a6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "2064B555-C880-4878-989A-2CC6568A76AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12ddw-a6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D56F5ED-B7B3-4B8D-83BC-0CB19BD8F66F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dgo-6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "C0A7FEB4-6372-42BC-8A3E-19DE64450D7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dgo-6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "169EECF4-BA7F-47CB-80A4-848A79EB552A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dgq-r_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "95476FBE-B4F7-42FE-A060-5CD460C6443F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dgq-r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5262CF8-A96F-4E95-A83A-663A60551A10" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dgu_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "88302A23-02AB-45D7-A3A5-BFD2691B1AF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dgu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC634195-B8D1-4410-8A36-54B528F5E818" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dhm-6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "E18662F3-F773-47CB-83A4-AD0B67A66CF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dhm-6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C586A8C-FF1B-4BF0-A8C1-C6A10C0EE16F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpd-a6m25_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "E262D39E-CAB0-49DB-9533-CD16F0D4AB1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpd-a6m25:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A3966B3-FF26-41C6-BF93-FA31E1C09A84" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpfr-an6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "F72B7AA8-BBD5-4490-9184-E9CE3DFA2E95" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpfr-an6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D03BF5A-FFE9-45B1-8C2C-C8128BCBF3D1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpg-ar_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "EFDD3D77-9464-464B-A977-625879DA6ABC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpg-ar:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87EA78EF-87FB-4B52-8430-0F6042D4DD03" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpg-oa6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "0D3A7A28-2F1D-4ACB-9515-27FC791465E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpg-oa6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51770E5F-7560-4D1E-BA72-4F94CA07E477" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpg-oa6-gd2_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "CCA6DA60-4E67-4423-9F41-4A0EC3675746" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpg-oa6-gd2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D54118C8-4C75-4C95-8055-6B072D66D8D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpg-qbt6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "5AC0E6B1-94D2-4C2F-BBFF-97B6490B696B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpg-qbt6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "923D2191-4164-4DD2-8C20-DBE60FF4B3BF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpg-qr_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "0BA33430-2D60-4139-8CE8-B0DD45C749C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpg-qr:-:*:*:*:*:*:*:*", + "matchCriteriaId": "170BD2F4-5084-4134-A307-6C7AFB82E6C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpg-qt6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "0D0E650C-AE7C-48E3-959E-11BB9FD45027" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpg-qt6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C83564AB-8D23-4352-AF0D-30B408F54DD8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpg-u6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B04F1D85-B26C-4BED-AFD8-B9B4CDAA465C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpg-u6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E445164C-B4DB-44B9-9CE2-122BC6616563" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpi-n6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "65E5E52B-2E68-4006-B10F-32000CCE419F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpi-n6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FA07B5C-1194-42A4-AF6C-3C3B7F880477" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpi-nt6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "2E1E04AF-DD68-4C7A-A73C-199F31ACB7BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpi-nt6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9BDD13D-5287-4536-83C7-1ED806E8AD45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpl-i6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "999BE14F-54EA-4A0B-ADEB-9D7338D00CA3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpl-i6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6606E793-BF7E-4148-83E3-2A6DF823AC50" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpl-nt6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "9878B129-167D-4D3B-BF70-BE7B5D011EE7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpl-nt6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80675EA0-674B-4BDF-B502-FAA90B4E07B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpt-b6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "11148105-FDED-413A-BAD3-3CCE29267334" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpt-b6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1762A2E5-9BCD-4832-9D6F-EFF6FC09A379" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpt-pt46_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "F571415A-618B-44FE-A4C8-D183317C85DC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpt-pt46:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA40A9FF-75AC-4B47-8C4C-DE571753F0F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpt-pt6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "4B68134A-0D7B-4C09-87F7-E973113FA867" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpt-pt6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECEEE89C-A717-497E-AE60-FECBCC856DC0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dpu-6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "85FC2F68-71B8-44C1-9D03-6A4167E10979" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dpu-6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D5EE5C9-4E57-4C7B-A385-494AB2E45035" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12dsc-6_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "8F0C7DDF-BAA5-4639-90C1-25DB26F5075C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12dsc-6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FE3F996-E887-462F-9292-18B7DB6D45FD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12qch\\+_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "19632406-A07D-4296-AD18-AFAA55441DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12qch\\+:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F2FE423-DE41-408F-BD8D-66D47FEAEBA6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sae_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B3801897-A401-4892-A4EE-FF5E3D724082" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sae:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1AAFEFE-7162-4563-8B52-FD722A929608" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sae-5_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "CEC86047-62B1-4225-8EE7-D94081CE2763" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sae-5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "317170CC-173C-441F-A949-333638B2FA55" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sca-5f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "818F20E9-05EC-4FB6-B921-091F381247AD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sca-5f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "768D9AB1-4E20-49D6-9EEB-4DE51F9288A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sca-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "753E5810-B93A-4B6F-9C88-28FD1F259045" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sca-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F023A6FB-2560-4B88-AFD2-95804630A2F5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12scq_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "BB2C3E6A-1A6A-454C-9D04-97D3B5E44E59" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12scq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE0592CB-58A5-4CC6-BE47-BDC50F496962" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12scv-lvds_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "1512D28D-3435-4A6F-98D7-8ED74C1B8C5F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12scv-lvds:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55F9B346-4C9D-4F23-ACB3-EC5B4C3271EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12scv-w_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "64A13C56-763C-4C6C-B39E-5D8DE5AD1669" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12scv-w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F70FEFBF-F3AB-492E-9802-A5E804C6E1F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12scz-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "E4506A1E-68C8-4F90-8BBF-A97A135B794F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12scz-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B6C62F1-063F-4B9D-8FFB-2A32EE5FD7F4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12scz-qf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "18CF94E3-762B-45BC-8BCA-87B48EDB9566" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12scz-qf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9EE82B1F-8994-4E4F-A515-6357A1645129" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12scz-tln4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "4036CD43-52D9-4759-8436-2C29921D0D39" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12scz-tln4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C06348E2-5AB3-4DFD-A2DF-7BD64C12ABCB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sdv-10c-sp6f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "BB766E78-6CA7-48A8-B7DD-3FF659111AB4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sdv-10c-sp6f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E61BA137-62D3-488E-842F-CE5F71A62916" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sdv-10c-spt4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "159158B7-6172-4762-8523-3E9CA651FF68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sdv-10c-spt4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E31BC56C-BEAD-4CEA-8EA1-244074825CF1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sdv-14c-spt8f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "37E4FA14-75E2-4F18-9CF2-7954067594A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sdv-14c-spt8f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DF63207-0C8B-4AE4-9C58-0B3906AF56A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sdv-16c-spt8f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "797C28CC-ECB1-473C-91FE-5B8C90F483E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sdv-16c-spt8f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FC72465-7062-4111-AFFB-14751D981772" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sdv-20c-spt8f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "E06E7506-52CC-46BA-8A54-748954E3CE9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sdv-20c-spt8f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F701465-E472-400F-AA8E-A23A1636458E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sdv-4c-sp6f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "38E0B686-1605-4D34-B98D-46CE5DAB5C57" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sdv-4c-sp6f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27886D70-CD59-451B-A22A-BDA9C216DA4E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sdv-4c-spt4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "E2E7C775-A494-454A-98B8-A467DB06FEDD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sdv-4c-spt4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0E2C8F-D697-4108-9ED4-C6EAD305003C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sdv-4c-spt8f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "E9B1AD70-057A-489C-B8FE-974D345E26DE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sdv-4c-spt8f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45F512E8-77D1-4DAE-8B62-CDFC3F36C30E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sdv-8c-sp6f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "FC4613BC-7233-47EF-A70A-010CB5FF1E66" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sdv-8c-sp6f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C701DCE6-0EC7-4DE5-BFA6-5ED582D13C4D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sdv-8c-spt4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "24427B55-1AC8-4020-A6F3-C57C173DFBFB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sdv-8c-spt4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4301217-8703-4D98-A7FB-F45DB4C9EA59" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sdv-8c-spt8f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "CD2B0693-E855-4143-89CD-0061040A2BF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sdv-8c-spt8f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A88762D9-3E01-4B25-868B-173040EA440B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sdv-8ce-sp4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "43396497-7840-4BF3-B625-D1BFBE6AB60A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sdv-8ce-sp4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB32C1B-1A46-4976-8D71-53BFF8F1429C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spa-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "639B97B4-E339-43EA-9911-99721C406698" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spa-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4ECEAB2-4D8A-447B-A622-E8E3282C1651" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sped-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "2F18CE69-1024-4AC4-85CA-16D6FFC4CAB1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sped-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECB324E7-F72B-41C7-9E63-4E9AE39420EC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spg-nf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "FB4DEA6C-25F6-4374-952F-5BA98386FF01" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spg-nf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22E9404C-5FFC-485D-A94E-1F7C4F68B0FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spi-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "1DD61F91-4407-4387-AF48-4FF97538F074" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spi-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA46A96E-0E1C-4AD0-A7BE-06A65C4DD75E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spl-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "73A298C7-5BE0-43CC-817D-1C7FAE38F543" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spl-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15FE00C9-77B3-43B4-A548-9C4F0FA83ABD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spl-ln4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "1C880CF4-019A-4270-830C-A0008854FB77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spl-ln4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D01A53FA-F307-4B49-B803-DD7E3498BD00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spm-ln4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "2B1D297B-735F-4715-8E1D-36C2551D5CDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spm-ln4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DEB567A1-A336-4B2E-8B35-0EE3F5B37ECD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spm-ln6tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "A06CA5D7-4D15-4F8C-BD44-8CFD10675911" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spm-ln6tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9766735D-CC06-446C-A6C9-C4A5671EA356" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spm-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "46CDD49A-4C1A-428E-B2B1-8C15F3D7DE96" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spm-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF8F8046-D474-4A41-AC0C-93C43BAFDCA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spo-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "C41502B0-419A-4EEE-A3D0-2226297E8DE5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spo-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D374750-F0F1-4F04-B127-7497DE767B19" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spo-ntf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "1774E077-1D08-42B0-A24E-614EB4EAB7B9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spo-ntf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77BFF598-DB0F-4696-9787-2216817F9DC5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spt-g_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "BD1A08D9-3A35-44A2-9B62-04A16421E1C6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spt-g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "414CABC0-9708-4C42-AFEE-03296D916319" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spt-gc_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "17A95DF1-0D00-4336-8685-ACE4CDEEAC20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spt-gc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "872EACFA-9A11-4801-9D97-7875D32F2E5E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spt-pt_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "7C5C3377-C72C-49D2-B9CA-C6CBF99375EB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spt-pt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27DB6C75-ECB7-453F-9A1B-99A962A13E6B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spw-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "EB67B3F4-7D78-4CA8-8F7E-3BAF483CB930" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spw-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53FA6DCE-6515-46FF-A347-B6C429003DEB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spw-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "81620B39-4A78-4F55-B4DD-D83C4AB4FF7C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spw-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "887FC02D-8065-44C9-A3B2-1FEEAF3EF56C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spz-ln4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "77487F7D-935D-423B-B434-89893474EE11" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spz-ln4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C067EC2-DA00-4D87-8903-C99E7058710D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12spz-spln6f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "282989D0-D5D0-4A89-9706-55289395BF27" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12spz-spln6f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A450B280-D321-41D7-8B9D-B8F3C8B3B786" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12std-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "10F85E07-0BF2-4F58-8F3D-BBA7EE67AD56" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12std-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEC355A7-ED7C-42DE-A7B5-76A21BD361EC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12ste-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "E055588E-65F9-4B15-B01F-031C74BD4A1A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12ste-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89049FC0-7786-4E8A-BF6A-56F70BCBADBC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sth-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "F7B188DD-1C6B-4A5F-9E2B-61435693218E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sth-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E76F1D7E-DC1F-45E2-BF79-8A33D5670DF1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sth-ln4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "E391C4E8-CAE8-41F9-8831-559E4DD66AF1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sth-ln4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DAAA4AD0-D2B9-43E0-A77F-9A75E242FDDB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12sth-sys_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "C12B7637-1E8F-44BF-939F-155701C182D4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12sth-sys:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20712495-C1FB-4332-B5EB-B68CB951B05F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12stl-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "21C67B23-0146-4E42-8380-BADCF0FDAF5F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12stl-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01576524-4AE1-4CE5-8909-8A2BBE579638" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12stl-if_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "64BFAF49-C93E-40B1-B5C6-2C45102AD111" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12stl-if:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CDBDBAC-14FF-46CF-8E72-C8BD9B66A475" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12stn-c_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "8DD20453-A699-4FAE-9144-CD35DCB1636B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12stn-c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "375F89CA-3F0E-4DA1-B044-93312B20561C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12stn-c-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "7AB356E7-1F23-42A3-8348-9D95FF3C3B40" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12stn-c-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6C5E4B6-7AC4-4871-A43C-1233B84FD769" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12stn-e_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "4D5C7EBE-985F-40E8-920D-8E9A8C737B81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12stn-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C40F79C0-3501-416E-A2B3-9C70D651E6C4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12stn-e-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "916310B5-8364-499B-82B1-03816A75C709" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12stn-e-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "834FE721-032F-462E-A12A-1FA38D1C24D9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12stn-h_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "E38FA954-FA36-4B54-A06B-834CC2599B2A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12stn-h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08D3196D-E172-44D5-9949-451500B51C10" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12stn-h-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "97A64327-AC40-4DA6-9012-4AF88C73A758" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12stn-h-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8EF75784-1632-4F72-8B34-1B3B6A6331E9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12stn-l_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "7CB43433-8039-437A-B819-77193A5C64F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12stn-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7370CC87-C0E3-4B7B-B01A-564764122E86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12stn-l-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "062E8B5E-A345-4E19-8E91-F7B06B5752CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12stn-l-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D7CCE200-88DC-42C8-953D-4E422013708F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12stw-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "30A9396C-B4B4-42B8-9316-BC096B04C458" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12stw-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DC3642F-DF65-4764-AFE1-96AF932266DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x12stw-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "1B78F8FE-0170-4CC6-8CAE-98C1A885F702" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x12stw-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E906BDB2-075D-446D-A86C-B9D3B9E25216" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dac_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "4BE50492-07D8-4D1C-8AF9-763F25997CCC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3600406-96B2-4E52-B5F9-9ABCED307EEC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dai-n_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "8633825D-939D-4826-A1BC-854ED2358A71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dai-n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C5967E7-B9A7-4F23-B966-51F5C82B2529" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ddw-l_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "2DBD8FD0-2033-4486-B19B-3A65F8B96F16" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ddw-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94B75335-6871-4FA6-AC30-1C121C91195C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ddw-nt_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "992113EF-3E48-4F43-888F-A072499405E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ddw-nt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3EFD3B3C-F46E-4B27-A16B-154DB9740ED4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dgo-t_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "61080B7E-47C7-4E4B-B9D4-E87F8AD13F7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dgo-t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0093BCEF-E0F0-415B-8267-01B5D71F2E61" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dgq_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "6E07FCDD-A555-4FB1-8528-DC291A6B7989" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dgq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D77FE66F-DB11-4B35-8A60-943FA5803F14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpd-l_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "416018C7-D968-4697-BB23-7D7C3F56307B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpd-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28A547F9-4267-421E-A569-D73F937D6CB4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpd-m25_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "E31A20BA-EF06-4BD6-B22B-E6C14C5394B9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpd-m25:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FF70FFB-8D20-4C4F-90B3-8681F94A6C0E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpff-sn_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "F0763501-BAEB-48FC-B74D-BCE5046C5011" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpff-sn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05703141-3375-468F-8F03-AFF548E95A39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpff-snr_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "1577F719-7CA4-4386-A22B-6BED1815EA2C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpff-snr:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1610EF6F-D8A9-4AE4-AFD8-D8D82654E38E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpfr-s_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "7D9E2486-03BD-45DD-916A-AD72CA3E12CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpfr-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DAD78F27-1418-46B2-95D7-7A2DA82FFD88" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpfr-sn_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "540B3344-9C8B-40FB-AF8E-88AC654C928F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpfr-sn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21FB236D-9777-4318-AE9D-3D565992E6BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpg-hgx2_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "6753B838-73FA-4F3C-9851-EF3FCF6B4071" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpg-hgx2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20492DE1-0D08-4769-83FF-16985A6E90F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpg-ot-cpu_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "C7554A27-12B6-4D35-BA9B-07F8BB2FD237" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpg-ot-cpu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EFF8666-E52F-47ED-9330-11E36A75495C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpg-qt_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "356257AB-4E25-40E0-B4E6-189CF1C9E958" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpg-qt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E309A80-F6FE-434D-B3EB-4593F18367A3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpg-sn_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "5BB2814E-3A02-42B1-BDC9-416452258F18" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpg-sn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C31C72A-AEF5-4F28-9EF8-00A19A39E7AA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dph-i_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "0CB2C0A8-13DE-4C20-AF87-8B7CF51890D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dph-i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F149C888-F3AF-49D4-BBBF-99ABC8E8CEDE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dph-t_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "F21135D9-BB90-47DC-B984-6E0843510DC8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dph-t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9780452F-4264-4069-9378-FE7F01D7ED1E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dph-tq_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "3567527E-5FC8-4E42-BFB3-4BF0FA7CF0FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dph-tq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03E3CB77-7874-4B9B-B6D9-69D42304D6BE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpi-n_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "52D9057A-9494-41B2-9AE7-1E321BE1F556" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpi-n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CEB1846-2BD2-4326-BD22-14DDD05BB7BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpi-nt_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "CE98E3AD-C668-422C-BD10-D7C813A38798" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpi-nt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5553A6E-4BCB-4EC1-B002-EDDDD313F4E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpl-i_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "27BB425D-F131-4F4C-AAB9-A0E31E072A9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpl-i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EF59606-20D1-4E68-AE55-DA3F7101654F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dps-re_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "F562BE69-049C-4C9F-8E6B-EF46193F4D30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dps-re:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED8E7045-1721-4629-B92C-F35C0B074245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpt-b_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "FD5A0214-AA78-4957-AD08-B545D672672E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpt-b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABF7F546-1D85-4F99-9CFE-6F997402028D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpt-bh_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "39C8AE86-11D2-48C8-A068-10008D227EAB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpt-bh:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F00FAD5-FBDF-4239-9B1C-C012B5AC546A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpt-br_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "1B9D103C-EA4C-439C-82E4-9B8C5AAD8E51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpt-br:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7710C62C-BFC9-4D9B-8EB1-A41273C06BF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpt-l_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "05760878-E696-425C-8363-C6303DD6388A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpt-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F14E33F-DCD7-49D4-B0F5-AF924A87CC53" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpt-ps_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "DF579C83-C768-453F-B7D9-27C2005146A3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpt-ps:-:*:*:*:*:*:*:*", + "matchCriteriaId": "749EF1B5-F6A3-493F-B920-8033847BF037" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpu_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "D17A0787-A669-4566-BF40-4EC9131AA557" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "609DE3AA-044C-4B20-8A27-A507F4A11279" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpu-r_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "A6E571AC-93BD-4079-AC51-125778A009FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpu-r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FF46B33-1765-44B9-A9B9-C3A97B5AD384" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpu-v_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "78E18E61-4068-4162-88E3-47D44BAA8497" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpu-v:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E125C5B7-7BB6-47EB-93A5-CA15FC082198" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpu-xll_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "6A906F07-7207-4674-A494-06C4E5134DB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpu-xll:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3CB5CAA-C9D1-4508-BBE6-2546F6017715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpu-z\\+_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "304B5920-89F2-4FFB-9F61-6BBAE035E462" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpu-z\\+:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4ED5B015-0DB1-4E55-8C22-6DCE0BCC00FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpu-ze\\+_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "44F2BDAF-65AA-4845-BA04-BD0C3F1D09A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpu-ze\\+:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01852618-551E-4051-90E7-7A3386804A76" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dpx-t_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "6664EB3B-0C03-4435-8456-DA5CF230BD5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dpx-t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3DB9F79B-70D5-4084-8DBF-E13CF76B77B7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dsc_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "697C92B5-B730-41CB-B656-5FBEA314255D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dsc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5786F44D-9EE5-4C0B-9C01-F0D46762F7E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dsc\\+_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "3B4398AD-AA39-4044-A9B5-99481B8E2711" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dsc\\+:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6442E1D1-53D8-49F4-8D51-08CE45850A77" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dsf-e_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "297D1AD5-0139-4405-8ED8-AF4F5F96D56B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dsf-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BBDD9667-CE5C-487D-BC40-506D3722AD4C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dsn-ts_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "3C92890C-1FC8-4FD3-AAA7-38FC798C2C39" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dsn-ts:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA8F01F8-FA29-4E46-858F-149F94C8DBD4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11dsn-tsq_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "F4E875ED-157A-496D-849F-5E11E736178E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11dsn-tsq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DECCF4B6-A0FD-419E-A61B-7BC023555E7A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11opi-cpu_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "132E6AA4-EEFA-41BC-9535-4CBC915DCDD8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11opi-cpu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27164AC7-6D07-4D0D-AE90-8FB4C2498E6B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11opi-cpu-cl_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "5276403F-DBEA-4929-B0A0-7E240C22762D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11opi-cpu-cl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5E14473-022A-4472-8742-4BBB97A90047" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11qph\\+_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "5597372A-F3D1-48C8-9C75-A3107D2F912A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11qph\\+:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E534D7BB-B73D-45F8-AB1A-CDC55B05D237" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11qpl_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "A46D5ED0-D590-4EC3-83BE-837ABB638A71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11qpl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E668445-7698-42D3-87A8-C82FFAEDDA40" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11saa_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "04EF0829-6E03-4AEF-A970-0E5F1C06FB05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11saa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97B2B57C-0599-4CD5-B886-B51907406530" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sae_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "2AE7457A-733F-4714-A741-E37C6847D5F5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sae:-:*:*:*:*:*:*:*", + "matchCriteriaId": "450DA6E7-7E1B-4E3F-916D-A04E8A64C9E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sae-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "8FC62932-8F3B-457D-AF1A-18F93007D765" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sae-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9DED254-4F7C-4BA3-BDB4-C20046F1801D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sae-m_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "1349CFA0-2294-4EC3-ACCB-E202FBBC7F97" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sae-m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DCC976BD-381E-452C-ABB6-E90F7D39FB31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11san_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "D1FECC94-F089-4A55-A1E0-5CD2DA011DEF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11san:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16146E8A-A13C-4347-82B1-AD2FD7EEE710" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11san-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "35D0CE32-106C-485A-8B2B-111FCBCFFC20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11san-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA94D270-1820-4325-ABAD-EF8B42D56DAB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sat_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B8886ED3-DDFB-44C0-870A-EF5E6F923921" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sat:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3F363C3-ACFB-4A15-9076-1C03E92DB138" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sat-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "4B93A5C2-9662-44D1-8DFD-562C844DB611" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sat-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F1C47C2-E481-40FF-BF6D-C327C1ABA050" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sba-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B448A736-AECF-4550-AB70-22A8BF030622" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sba-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FCF6EF1-D3E3-40CA-8AE4-BFFF37964541" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sba-ln4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "5C4D1A46-7763-4FEF-B32E-29494755028E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sba-ln4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C15EA79-AC77-4254-821E-DCBD4748E73C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sca_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "61C8DCC0-DA05-44C2-BD5B-BA2BD2664A5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sca:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2521B38-3BB4-4B96-AF7C-6BF429F0FC9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sca-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "ABD3DBBD-BF92-4BAC-ADC3-B3002571533D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sca-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "577067B9-0F45-4A40-A75F-C7FE9B2B8855" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sca-w_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "14FC8981-EE22-446C-B3BA-43D4EA25F275" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sca-w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "683EB125-0F49-4199-9244-F17ECA6F6C4C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11scd-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "C89DE7EC-9EB2-40B0-80F5-8BF3527B74FE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11scd-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C89CC49B-01DE-4888-B0E4-B311C0F3F789" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sce-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B5739500-AB10-4CE2-95E2-F65EA2D2B779" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sce-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BF53152-845A-4736-8FB0-C672D8A83F68" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sch-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "D70CE1AD-78BF-432A-84BC-5FD6BE4B6E5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sch-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E9B23E2-2E68-4E1D-A8B5-BAFB00DFB4BF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sch-ln4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "46071A5E-2291-4621-914F-3CBB3437036D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sch-ln4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "071A5B7E-6525-44DF-A612-DB63312AA3A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11scl-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "0042216F-C5B6-4478-83D2-229E24ABF2FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11scl-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1528A2C-3983-4CF9-B365-7F307B93E466" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11scl-if_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "CB27048F-10BC-436B-A139-C33F861C3846" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11scl-if:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98595EB1-0B54-4E09-BAB1-4A37BCBB941A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11scl-ln4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "82DE3F62-F590-4293-8588-E47204D083AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11scl-ln4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "586D8457-A684-4410-A48A-C5545F5B2003" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11scm-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "F63FE7EC-D7C5-43EE-9053-AE364588E98C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11scm-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B7B927B-1B10-41CC-8C8E-0DA456082C63" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11scm-ln8f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "849E1220-EC92-41B9-B27A-8B9E4EA04F6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11scm-ln8f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0176160-C4E3-435E-8DDD-E992044C500B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11scq_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "CDEC4239-2014-4479-A810-932B2B68AF4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11scq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19DB281A-F2B0-48D9-83B9-21CB651D34E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11scq-l_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "AB9C837A-E11A-4135-AE80-0CC6B910B380" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11scq-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83A3CC6C-B6DA-4C5F-97FF-B7075C2D1936" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11scv-l_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "85D6B8BD-291B-4753-98C0-8629C962B6C5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11scv-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F49DCD87-5179-4AB0-B859-79CE26145125" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11scv-q_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "30EF7DA2-51AC-4064-B679-DBE1A869C0F0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11scv-q:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA86A993-5A42-416E-B91A-54DC1719776F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11scw-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "3A35A0FA-76EA-411F-850A-A36AC20D2E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11scw-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FB564A1-E87A-4CAD-A8E8-5A22B0165B61" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11scz-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "FBAC3A63-BC83-4B2D-808B-7ED330764644" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11scz-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03512A43-F226-4E93-8D38-5C3513AD5478" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11scz-q_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "9E4854AD-2561-47BA-8248-E5F045FAB070" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11scz-q:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A5ED2C4-0267-4F6C-BD29-9E0CEF01339E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdc-16c_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "CB406DAD-3EFF-4934-A1E0-0CABEEBD1012" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdc-16c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F45F4322-46AA-4865-808A-90FBE12386C8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdc-4c_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "CA85522C-E77A-4BF4-ABDE-3FE7D8E64D1C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdc-4c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C4FE5EB-4CB5-449F-8BB5-DD7BEE5CD39C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdc-8c_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "DCA3FA9E-71C5-4B9A-8C25-EADA4EF89FE7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdc-8c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4008F053-1E0C-477B-964F-9435801D09C4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdd-18c-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "6AA3FC73-9A4B-4292-8819-2F469343D824" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdd-18c-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF1E70CB-BF44-4DE8-BA2F-47283586FA9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdd-8c-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "2EEB618F-65C0-4AF7-BFC5-B33714346728" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdd-8c-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39BD8B01-9630-463C-870C-76EC7FE2D325" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sds-12c_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "4B3E9CA8-314E-4C07-AEC6-255A0B02122B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sds-12c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9B43F7A-EF17-498A-8AEA-F4E98547DCDA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sds-14c_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "03E64734-7D31-4676-B04D-9FE1A05AA2AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sds-14c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D2667BB-FE14-469F-9CC6-EB44B5B45DF3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sds-16c_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "240EEEC9-91DC-48C9-A4A6-C753F2C1756B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sds-16c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B921DB-EF3B-4E6C-B67A-6E57EF2CCB1C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sds-8c_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "2F7ED116-0803-4FEB-BDF2-AA77619E0BB8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sds-8c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25EA425D-7D25-44BA-A6E1-210349DC4AC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdv-12c-tln2f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "CEE6ADCA-47F2-4A4A-9B68-65932856C66A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdv-12c-tln2f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5D77AED-1F86-4C4E-80D1-473C65DA3EF3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdv-12c-tp8f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "29DB0C5D-892E-4C44-92D9-A5B414A04C1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdv-12c-tp8f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97A5A305-FFE9-4F2C-94F9-9B4E8ED255EC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdv-16c\\+-tln2f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "E6653554-89E5-4F10-93DC-BAD4337D0DC1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdv-16c\\+-tln2f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "807D44E4-85DA-4F3D-BD0D-7393ABBDE9D2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdv-16c-tln2f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "1C967A95-9CA1-4EB5-B153-AAFFE7626823" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdv-16c-tln2f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDC0B8F1-EAFB-44E0-B3B5-8A8D5EBD51E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdv-16c-tp8f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "941D9F12-9CC3-482C-BE92-A7F920819331" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdv-16c-tp8f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C5DDB30-1E22-42C1-8F9E-381004F9DDB5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdv-4c-tln2f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "895FF0B9-7EEA-467E-80AA-560A4B0793D4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdv-4c-tln2f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59D0561D-78DE-47B7-B8E5-E1D6F9BB73B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdv-4c-tp8f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "4371A185-BF71-49C7-9318-B0AD11B4AE69" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdv-4c-tp8f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C1ECBB36-CA02-4A8F-AC62-97C695E067C6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdv-4c-tp8f-01_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "CB9A43BC-5D86-427A-99D0-B19DAB2D94F7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdv-4c-tp8f-01:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F8CDF9F-2650-46A6-AC3A-5FC61C942E87" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdv-8c\\+-tln2f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "9E01FBF7-605E-469B-8B5A-6B26332CB704" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdv-8c\\+-tln2f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D935CA76-84EB-4B3D-A4EF-6BE8F8ED750E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdv-8c-tln2f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "A9819485-E143-481A-A058-420ECFF3C75B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdv-8c-tln2f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA40B6EF-E65E-4494-A368-41966BCAE70C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdv-8c-tp8f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "C125AF3D-A650-499E-85BB-6DAB33EC7C4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdv-8c-tp8f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F58D8FAC-A913-431F-86FA-E7FF585684A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdw-12c-tp13f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "33925DDC-A825-4029-A034-9BFF0C62F7A3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdw-12c-tp13f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F8AA874-B736-4C30-BC48-8BDF1A21463D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdw-14c-tp13f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B6A7F79F-3632-424C-888A-314549607C14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdw-14c-tp13f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4B8CFE3-D081-4A65-8A5E-BEA397F9195C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdw-14cn-tp13f\\+_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "8EFF4246-365E-4C50-B1CD-4F7EC0A281F3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdw-14cn-tp13f\\+:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D58AEE8-3390-490C-A04F-9A3675FA7E6F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdw-14cnt-tp13f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "BA3304CB-E384-4A41-91C1-23023907B52D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdw-14cnt-tp13f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB50C171-3075-4A7C-97B9-6C48AE5E1222" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdw-16c-tp13f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "41005504-CE28-4228-8B06-512E2083F276" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdw-16c-tp13f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF949680-3AE1-4806-8A96-B7F50E9CAE0B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdw-16c-tp13f\\+_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "0619F3CD-CC67-4827-AE3D-DD9CA646555E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdw-16c-tp13f\\+:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CC6354D-DBB1-457C-B9C9-FAF2265BAE5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdw-4c-tp13f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "265BCB39-7942-417E-AD82-D903C9E410E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdw-4c-tp13f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5556FAA3-B53C-494A-8AB7-4942FE0E3757" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdw-4c-tp13f\\+_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "71F71EA7-FE29-4DF6-A092-98A4019C12EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdw-4c-tp13f\\+:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAF047A7-2B8F-44DB-9D2E-AEA638E3CCBC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sdw-8c-tp13f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "927581C8-56FC-4EC2-9781-22F764BAE269" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sdw-8c-tp13f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9379DEA-1052-4A46-831F-A3F45CDF51C1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11spa-t_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "18630E63-C300-41AC-8729-4418C2A6DC6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11spa-t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93841CE8-D876-44A3-A530-959CDB90FA7B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11spa-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "377B2DF6-3E30-43C1-8268-B41B967C43AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11spa-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6440101-3C85-427B-A930-014CCDA79CCD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11spd-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "78FD0BEE-D475-48B9-9125-DA0B043063B0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11spd-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2EAD8C3-4C86-41EA-94C2-8A025BD11C96" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11spg-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "DF338C11-81EA-4D1E-8785-2EDB6BFBB17C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11spg-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D4C8250-1682-4360-828F-8E7EE072CE6D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sph-nctf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "92B129E9-A4F6-4643-9FB9-443FCDD764AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sph-nctf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DABCA06-C8F1-4A20-9F85-69B49B3C5095" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sph-nctpf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "867CE591-8F70-4FA4-850C-B2490B7C19E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sph-nctpf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABF784B2-347A-4A62-9CC3-6A01624D0F07" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11spi-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "0F7BFD4D-CB73-460B-9E11-486817129495" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11spi-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "069F2E47-05DA-4676-9A11-B5059130720A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11spl-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "ED404BD7-9873-485F-ABC4-D27470ED113A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11spl-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "372B1F73-010B-4E12-A643-336741265B23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11spm-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B5956F7D-ADB1-4B1F-B5E7-60E68DC13E14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11spm-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1023FE03-0D76-4F33-ADC3-4502BD8AAE79" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11spm-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "5C4BA06E-A3CD-42E4-96BC-F16BCA654F75" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11spm-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09E13FF0-04D4-41CD-97B8-1860028F8F8F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11spm-tpf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "482E5372-9001-42F5-A800-DECB62D6218D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11spm-tpf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D4232C6-8C0B-41B1-AF69-A4E584756777" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11spw-ctf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B7D9E669-D0F7-41C8-9467-7CEE659F9818" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11spw-ctf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0BEF4BD-0962-4DC0-9329-5C28DAE78B93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11spw-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "2903AFD1-DD53-45B9-AC45-EE4318953190" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11spw-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0998B7F1-CD28-4E07-8BA0-53EEEE9A25CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sra_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "1E277DCF-D312-405B-87ED-8F2C849D1972" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sra:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD640185-AC03-4235-A8BF-F71473A3D21B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sra-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "25863AED-0930-4B92-9543-B3ECDB41F6E6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sra-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E90E4534-1E54-4731-AFBF-5742274AAE1B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sra-rf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "26854260-D5B1-4896-BCC4-BDC300EC74F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sra-rf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88A40C12-CDC6-4065-A65F-1ABB411BF12E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sri-if_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "671629CA-F04B-451F-8BE1-34E0AA5FE73C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sri-if:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92C0DDA9-ED3B-4DC8-B19E-19B9283A2C12" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11srl-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "F8C9D99F-51EF-436B-A632-6A287929C1E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11srl-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "900E0C75-C843-4327-BAF2-F8077281D87E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11srm-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "87C66CF8-B9F6-4804-884B-0F99EDEF54A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11srm-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "161177BA-5C2B-47DF-B900-568D0665020A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11srm-vf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "06A5E49A-5E22-4FC9-B669-C107F528EFBA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11srm-vf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB7EC704-0887-4743-AD5B-F9CF6EEE4B29" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssa-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "0892BBDA-B31B-4558-9C51-B129A4B0F9FD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssa-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "48D2E9CD-71D4-4556-A0F2-2C3B7FB8A77E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssd-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "05BCD88A-F10A-4F1D-B129-E6E34329EF1B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssd-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B72F70A-B33E-4382-81DA-3864C2E14D41" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11sse-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "09C66363-58E4-4B8F-8D76-A5E61C40820F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11sse-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC57F4A1-10F8-4926-A446-D2B8F05B8008" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssh-ctf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "3E763AED-58A3-4B45-BEE8-F0DBD2273C30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssh-ctf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95CD6DEE-E000-42C2-825B-C29E3F7D725C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssh-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "05731059-73C8-4A9F-B651-62937B728767" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssh-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7BE07CB-DED5-4810-9D04-884478CA1532" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssh-gf-1585_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "A2479843-DDFF-4B53-A42F-6E715D36D040" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssh-gf-1585:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6430B42-E04A-4CEF-8318-074536119201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssh-gf-1585l_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "67C4F018-28D7-4432-A5C2-7F04A1186EE0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssh-gf-1585l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "184762F2-E3A2-46F7-AC09-00DED69C7A4D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssh-gtf-1585_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "5B898C1E-1D08-445F-96E7-CC9C30AC264C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssh-gtf-1585:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D07E7DBE-010F-4F21-8B4D-18DE8BF59D9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssh-gtf-1585l_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "321E79A8-251C-4CDF-8D82-B8AECE80B377" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssh-gtf-1585l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54CCEFD5-FE80-42A5-8ED1-BEE9BCAA21AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssh-ln4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "DDA317E8-5F90-4C3E-B2DB-5BB843F7036D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssh-ln4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "063C19C8-9A26-4457-A969-0172FA2E2BE4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssh-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "2574D409-99F0-4B5A-A083-F70A67641D7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssh-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDF932E7-ABDF-4541-B032-D013D881A25D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssi-ln4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "EE805506-31AB-4A37-BB72-46E279AB2824" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssi-ln4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00A6A4DB-ED52-4DF1-809D-ADCA9F8324A1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssl_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "98116A5B-3572-4FC5-A2B5-17AA4A8B7D22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DA4B4D9-59CF-43D3-ACBE-8091C257C8FE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssl-cf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "7155E1B1-3F93-4A45-A0DD-E3207567C2A9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssl-cf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FA01B7B-0A5F-48AC-811C-BB6EB4C78719" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssl-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "DB8E9380-7211-4291-8A20-B824788DD361" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssl-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F59AC9E2-69C0-42EF-82D3-F304D4918E8D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssl-nf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "6135023F-487A-494D-93BD-00B6B1AB5FE3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssl-nf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84671D8E-00A2-4AC1-9B7E-9B7BB5188B3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssm_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "51BE935C-26D0-40D3-BD89-E687FB03D822" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssm:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E28641A6-F24E-493D-B57B-954DA91F47B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssm-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "AC8C1870-205D-4274-AC1E-97520C8D84DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssm-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EC19D26-080D-4B5A-A41C-253D00036608" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssn-e_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "9024100A-B534-4767-AD82-6D68B35F528D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssn-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36D80443-7089-4484-B9F5-029BAFF1A5BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssn-e-001_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "7AF85C30-B3D3-4AA0-BB47-8514B07AA9E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssn-e-001:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDF406B5-6051-429F-B4BA-B5FCC3438E2E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssn-e-vdc_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "F7509A40-6C8A-4158-A291-08423AF67D8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssn-e-vdc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3311514-CCB7-423F-9CD7-A0AF63E5EC4A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssn-e-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B9F9EDD4-B350-47A8-968D-0CA7807D1656" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssn-e-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E16D25E7-A713-4B72-B386-A6DFD024AA5A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssn-h_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "AF8C94B5-5FA5-4C5B-B6CB-3D77C0E9B309" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssn-h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0000DB52-9B92-45B5-BB63-4C694E3714D1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssn-h-001_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "AD96DBC3-6110-48D0-A88A-46379D24AAD8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssn-h-001:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D35739F-DF6C-47A1-A4FB-B3415F33AD55" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssn-h-vdc_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "48BC8AA2-8DF0-4B73-9AF6-476F20C9805B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssn-h-vdc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D97BA507-5721-4360-BBF2-65D94C038C51" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssn-h-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "77D5EBA8-4A56-4E31-85C4-E257BB87EDD5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssn-h-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D376009A-CE57-4389-837A-C1933B95FC4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssn-l_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "252C49DA-308D-4CD1-8E6E-BC63F6246DD8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssn-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D25709E2-5B71-428A-8D67-2963903C12BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssn-l-001_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "679DC010-4BBD-4BB7-B3E6-7ACB466B3039" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssn-l-001:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CED7FE1-ACF5-4FDF-8942-A1F3DF583242" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssn-l-vdc_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "18CAAC39-7134-42A3-A1F1-D4E28C7B8CB6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssn-l-vdc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A9F87DA-EDA8-47FB-8574-F3BFE24C7D03" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssn-l-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "B1C89DDB-53B4-4C64-9DE8-1D355E625B38" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssn-l-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68216C46-DBCB-4666-AE4A-4EC895571367" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssq_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "636DF182-2C81-4E3D-A574-D8954178E876" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8573A582-A52A-4006-99F0-D42C3AE5B722" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssq-l_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "D6798F23-3EFB-4E50-B008-4387EA7BD64B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssq-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03CC1ABD-321B-4680-AFCC-5E4AD6E1A903" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssv-lvds_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "C525E969-B16D-4B77-B26A-8DB59E2C3E94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssv-lvds:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A7D90D9-531C-4904-BEB5-35CED4F4670A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssv-m4_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "1AC7954D-DD60-4681-811F-E283D1945990" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssv-m4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DA13087-4F08-484F-8083-104A48E533C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssv-m4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "918880F9-7E0D-4EE9-A3F2-6076CF56FDCC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssv-m4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D258D3F-A52F-4E7F-9883-CC48A49A31D1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssv-q_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "A44B5078-FF02-44D9-993E-9920D6CB69B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssv-q:-:*:*:*:*:*:*:*", + "matchCriteriaId": "90CB1E05-C42D-43F9-95F5-258C87A9A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssw-4tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "CCAD1C84-44A4-4DF3-B986-CC74B9BE1D07" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssw-4tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6089DFBF-A190-4A4C-9DD8-1DA4D539A5F1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssw-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "EC58D65B-87D2-4EEF-9869-B8843EF7DD39" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssw-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6CDDDC18-753F-496F-9953-5B91ED1CC0F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssw-tf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "8B851DE0-7AB2-446B-97FA-B01258045317" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssw-tf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A180D6C-1A5B-41E0-A4CA-99CD49CBF585" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssz-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "AB458920-62A4-46BB-A9D1-D8DEAAF031CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssz-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25DA80D6-C893-4B91-94ED-9FE4403DC6E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssz-qf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "0E796E38-6EE5-407F-B461-A44E47A3DE23" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssz-qf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A003C87A-7055-497C-B320-DF15F0D112D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11ssz-tln4f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "897E7B81-6038-4F64-8B7D-F0099DF2BB88" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11ssz-tln4f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C338781-88C1-476A-A3C9-2018016BF2EC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11swn-c_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "CDD7E679-7040-454D-A158-7AAB9364AA78" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11swn-c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E34FEF2D-51C2-4FC9-AC2A-7A40BDA5EDA8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11swn-c-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "2476AEA6-1961-48B9-91C7-39668153AD49" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11swn-c-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59F6BF1F-A8EC-4A61-9BBC-0B46877BE366" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11swn-e_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "35F1718A-6782-42C3-9CBF-506D8C5FBD76" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11swn-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "830F9903-EF91-48E0-ACEB-76C629886680" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11swn-e-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "A611E64F-3E3F-4B7F-AC97-B138B864A3E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11swn-e-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5FE79CD-C7B6-458E-82F0-1D6DBA9AC2B5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11swn-h_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "32FB8458-08DB-4EF0-AC9D-D3E6059CD697" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11swn-h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7493C93F-A80C-4F19-BA3E-BB0C7FE95BE1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11swn-h-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "158059FE-ECB1-47D9-9C28-9544D006833B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11swn-h-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09B2349B-0BDF-4B73-91D8-756D81900C5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11swn-l_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "0EB394CD-C7B8-4967-8846-E59E904BA0BB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11swn-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECBDA83D-46FC-42E6-AA22-EA312946352C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:supermicro:x11swn-l-wohs_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.17.02", + "matchCriteriaId": "BB93281C-B13A-40C2-88E5-199AB3FE3E26" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:supermicro:x11swn-l-wohs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D58DB7DA-B8C4-4E37-BAFE-574CA01A9691" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "http://supermicro.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.supermicro.com/en/support/security_BMC_Dec_2023", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35039.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35039.json index 2d4ade6f46d..1d5e6ae7065 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35039.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35039.json @@ -2,16 +2,40 @@ "id": "CVE-2023-35039", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-07T12:15:07.360", - "lastModified": "2023-12-07T16:09:27.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:54:28.523", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Restriction of Excessive Authentication Attempts vulnerability in Be Devious Web Development Password Reset with Code for WordPress REST API allows Authentication Abuse.This issue affects Password Reset with Code for WordPress REST API: from n/a through 0.0.15.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de restricci\u00f3n inadecuada de intentos de autenticaci\u00f3n excesivos en Be Devious Web Development Password Reset with Code para la API REST de WordPress permite el abuso de autenticaci\u00f3n. Este problema afecta el restablecimiento de contrase\u00f1a con c\u00f3digo para la API REST de WordPress: desde n/a hasta 0.0.15." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bedevious:password_reset_with_code_for_wordpress_rest_api:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "0.0.16", + "matchCriteriaId": "0EC5E2E4-D488-448D-8114-3D69166960EE" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/bdvs-password-reset/wordpress-password-reset-with-code-for-wordpress-rest-api-plugin-0-0-15-privilege-escalation-due-to-weak-pin-generation-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35619.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35619.json new file mode 100644 index 00000000000..78234016be4 --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35619.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35619", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:16.913", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Outlook for Mac Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35619", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35621.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35621.json new file mode 100644 index 00000000000..6afaca261f1 --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35621.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35621", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:17.090", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Dynamics 365 Finance and Operations Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35621", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35622.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35622.json new file mode 100644 index 00000000000..b28faf0df95 --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35622.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35622", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:17.260", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Windows DNS Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35622", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35624.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35624.json new file mode 100644 index 00000000000..fefca38eb83 --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35624.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35624", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:17.440", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Azure Connected Machine Agent Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35624", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35625.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35625.json new file mode 100644 index 00000000000..3b96b822570 --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35625.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35625", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:17.620", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Azure Machine Learning Compute Instance for SDK Users Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35625", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35628.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35628.json new file mode 100644 index 00000000000..cd225010857 --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35628.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35628", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:17.807", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Windows MSHTML Platform Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35628", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35629.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35629.json new file mode 100644 index 00000000000..c20afbcaeda --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35629.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35629", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:17.990", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft USBHUB 3.0 Device Driver Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35629", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35630.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35630.json new file mode 100644 index 00000000000..3ede2baa07f --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35630.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35630", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:18.183", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Internet Connection Sharing (ICS) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35630", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35631.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35631.json new file mode 100644 index 00000000000..7a891575949 --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35631.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35631", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:18.360", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Win32k Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35631", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35632.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35632.json new file mode 100644 index 00000000000..0052fb1e552 --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35632.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35632", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:18.547", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35632", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35633.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35633.json new file mode 100644 index 00000000000..f5cb980f579 --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35633.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35633", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:18.760", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35633", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35634.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35634.json new file mode 100644 index 00000000000..e2ccec2a77c --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35634.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35634", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:18.937", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Windows Bluetooth Driver Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35634", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35635.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35635.json new file mode 100644 index 00000000000..fa6748bdae7 --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35635.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35635", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:19.107", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35635", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35636.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35636.json new file mode 100644 index 00000000000..0cf021aebee --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35636.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35636", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:19.277", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Outlook Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35636", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35638.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35638.json new file mode 100644 index 00000000000..8e68276b676 --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35638.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35638", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:19.460", + "lastModified": "2023-12-12T18:58:44.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "DHCP Server Service Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35638", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35639.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35639.json new file mode 100644 index 00000000000..62c80a7767e --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35639.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35639", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:19.643", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft ODBC Driver Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35639", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35641.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35641.json new file mode 100644 index 00000000000..2293cbb2105 --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35641.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35641", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:19.823", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Internet Connection Sharing (ICS) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35641", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35642.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35642.json new file mode 100644 index 00000000000..75fd8c01be1 --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35642.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35642", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:19.993", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Internet Connection Sharing (ICS) Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35642", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35643.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35643.json new file mode 100644 index 00000000000..41c3cc7f0cd --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35643.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35643", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:20.263", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "DHCP Server Service Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35643", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35644.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35644.json new file mode 100644 index 00000000000..962f6e7c868 --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35644.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-35644", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:20.517", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Windows Sysmain Service Elevation of Privilege" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35644", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35909.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35909.json index 193ac9183f9..c482d34faa2 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35909.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35909.json @@ -2,16 +2,40 @@ "id": "CVE-2023-35909", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-07T12:15:07.610", - "lastModified": "2023-12-07T16:09:27.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:53:56.970", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Uncontrolled Resource Consumption vulnerability in Saturday Drive Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress leading to DoS.This issue affects Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress: from n/a through 3.6.25.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de consumo de recursos incontrolado en Saturday Drive Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder para WordPress que conduce a DoS. Este problema afecta a Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder para WordPress: desde n/a hasta 3.6.25." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.6.26", + "matchCriteriaId": "CD598414-0E33-4984-84D8-92A633BAD957" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ninja-forms/wordpress-ninja-forms-plugin-3-6-25-denial-of-service-attack-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36003.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36003.json new file mode 100644 index 00000000000..2618c82fe4b --- /dev/null +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36003.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36003", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:20.697", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "XAML Diagnostics Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36003", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36004.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36004.json new file mode 100644 index 00000000000..a1bda36067a --- /dev/null +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36004.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36004", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:20.890", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Windows DPAPI (Data Protection Application Programming Interface) Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36004", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36005.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36005.json new file mode 100644 index 00000000000..60e8a530ddf --- /dev/null +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36005.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36005", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:21.070", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Windows Telephony Server Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36005", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36006.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36006.json new file mode 100644 index 00000000000..3a43d88990e --- /dev/null +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36006.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36006", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:21.250", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36006", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36009.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36009.json new file mode 100644 index 00000000000..a0289564423 --- /dev/null +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36009.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36009", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:21.430", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Word Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36009", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36010.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36010.json new file mode 100644 index 00000000000..ddfb48b5d33 --- /dev/null +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36010.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36010", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:21.610", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Defender Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36010", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36011.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36011.json new file mode 100644 index 00000000000..f439f354e33 --- /dev/null +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36011.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36011", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:21.793", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Win32k Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36011", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36012.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36012.json new file mode 100644 index 00000000000..05a0e1e728b --- /dev/null +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36012.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36012", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:21.970", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "DHCP Server Service Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36012", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36019.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36019.json new file mode 100644 index 00000000000..64d2467efa3 --- /dev/null +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36019.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36019", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:22.157", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Power Platform Connector Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36019", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36020.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36020.json new file mode 100644 index 00000000000..d843fefb8e5 --- /dev/null +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36020.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36020", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:22.333", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36020", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36391.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36391.json new file mode 100644 index 00000000000..eb9d2ab1244 --- /dev/null +++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36391.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36391", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:22.510", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Local Security Authority Subsystem Service Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36391", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36655.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36655.json index 931765a58f6..a11a52a8929 100644 --- a/CVE-2023/CVE-2023-366xx/CVE-2023-36655.json +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36655.json @@ -2,23 +2,86 @@ "id": "CVE-2023-36655", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-06T16:15:07.047", - "lastModified": "2023-12-06T18:49:19.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:39:02.243", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The login REST API in ProLion CryptoSpike 3.0.15P2 (when LDAP or Active Directory is used as the users store) allows a remote blocked user to login and obtain an authentication token by specifying a username with different uppercase/lowercase character combination." + }, + { + "lang": "es", + "value": "La API REST de inicio de sesi\u00f3n en ProLion CryptoSpike 3.0.15P2 (cuando se utiliza LDAP o Active Directory como tienda de usuarios) permite a un usuario bloqueado remoto iniciar sesi\u00f3n y obtener un token de autenticaci\u00f3n especificando un nombre de usuario con una combinaci\u00f3n diferente de caracteres en may\u00fasculas y min\u00fasculas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:prolion:cryptospike:3.0.15:p2:*:*:*:*:*:*", + "matchCriteriaId": "51A592E8-274C-4A8A-B925-075FCA82DD22" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://prolion.com/cryptospike/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2023-36655", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36696.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36696.json new file mode 100644 index 00000000000..b71bb2e3fa3 --- /dev/null +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36696.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36696", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-12-12T18:15:22.690", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36696", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38694.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38694.json new file mode 100644 index 00000000000..1aeabb52569 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38694.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38694", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-12-12T17:15:07.917", + "lastModified": "2023-12-12T17:22:30.567", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Umbraco is an ASP.NET content management system (CMS). Starting in version 8.0.0 and prior to versions 8.18.10, 10.7.0, and 12.1.0, a user with access to a specific part of the backoffice is able to inject HTML code into a form where it is not intended. Versions 8.18.10, 10.7.0, and 12.1.0 contain a patch for this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-xxc6-35r7-796w", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39167.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39167.json index d0e07d4f66f..049b855946e 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39167.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39167.json @@ -2,12 +2,16 @@ "id": "CVE-2023-39167", "sourceIdentifier": "info@cert.vde.com", "published": "2023-12-07T14:15:07.467", - "lastModified": "2023-12-07T16:09:27.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:43:09.240", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In\u00a0SENEC Storage Box V1,V2 and V3 an unauthenticated remote attacker can obtain the devices' logfiles that contain sensitive data." + }, + { + "lang": "es", + "value": "En SENEC Storage Box V1, V2 y V3, un atacante remoto no autenticado puede obtener los archivos de registro de los dispositivos que contienen datos confidenciales." } ], "metrics": { @@ -36,8 +40,18 @@ }, "weaknesses": [ { - "source": "info@cert.vde.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, + { + "source": "info@cert.vde.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,10 +60,101 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2023-06-19", + "matchCriteriaId": "8C6796ED-84F3-47E8-BD21-5CEBC1DD62E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:enbw:senec_storage_box:v1:*:*:*:*:*:*:*", + "matchCriteriaId": "1A73E447-D78F-420B-B256-1F157A6DA364" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2023-06-19", + "matchCriteriaId": "8C6796ED-84F3-47E8-BD21-5CEBC1DD62E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:enbw:senec_storage_box:v2:*:*:*:*:*:*:*", + "matchCriteriaId": "300B219B-45CA-44C0-AC39-D94057FA8860" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2023-06-19", + "matchCriteriaId": "8C6796ED-84F3-47E8-BD21-5CEBC1DD62E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:enbw:senec_storage_box:v3:*:*:*:*:*:*:*", + "matchCriteriaId": "449C542C-CAE3-42A9-BF45-EE6E828A4EBE" + } + ] + } + ] + } + ], "references": [ { "url": "https://seclists.org/fulldisclosure/2023/Nov/5", - "source": "info@cert.vde.com" + "source": "info@cert.vde.com", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39169.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39169.json index 2212b3b1504..13b9ed67702 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39169.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39169.json @@ -2,12 +2,16 @@ "id": "CVE-2023-39169", "sourceIdentifier": "info@cert.vde.com", "published": "2023-12-07T15:15:07.777", - "lastModified": "2023-12-07T16:09:27.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:57:54.800", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The affected devices use publicly available default credentials with administrative privileges." + }, + { + "lang": "es", + "value": "Los dispositivos afectados utilizan credenciales predeterminadas disponibles p\u00fablicamente con privilegios administrativos." } ], "metrics": { @@ -36,8 +40,18 @@ }, "weaknesses": [ { - "source": "info@cert.vde.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + }, + { + "source": "info@cert.vde.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,10 +60,98 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF2C3F5B-266D-455B-944D-9EDBB0268439" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:enbw:senec_storage_box:v1:*:*:*:*:*:*:*", + "matchCriteriaId": "1A73E447-D78F-420B-B256-1F157A6DA364" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF2C3F5B-266D-455B-944D-9EDBB0268439" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:enbw:senec_storage_box:v2:*:*:*:*:*:*:*", + "matchCriteriaId": "300B219B-45CA-44C0-AC39-D94057FA8860" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF2C3F5B-266D-455B-944D-9EDBB0268439" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:enbw:senec_storage_box:v3:*:*:*:*:*:*:*", + "matchCriteriaId": "449C542C-CAE3-42A9-BF45-EE6E828A4EBE" + } + ] + } + ] + } + ], "references": [ { "url": "https://seclists.org/fulldisclosure/2023/Nov/3", - "source": "info@cert.vde.com" + "source": "info@cert.vde.com", + "tags": [ + "Mailing List", + "Not Applicable", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39171.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39171.json index b61c9f50b33..34e6fe64943 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39171.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39171.json @@ -2,12 +2,16 @@ "id": "CVE-2023-39171", "sourceIdentifier": "info@cert.vde.com", "published": "2023-12-07T15:15:09.990", - "lastModified": "2023-12-07T16:09:27.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:59:53.220", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "SENEC Storage Box V1,V2 and V3 accidentially expose a management UI accessible with publicly known admin credentials." + }, + { + "lang": "es", + "value": "SENEC Storage Box V1, V2 y V3 exponen accidentalmente una interfaz de usuario de administraci\u00f3n a la que se puede acceder con credenciales de administrador conocidas p\u00fablicamente." } ], "metrics": { @@ -46,10 +50,101 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2023-06-19", + "matchCriteriaId": "8C6796ED-84F3-47E8-BD21-5CEBC1DD62E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:enbw:senec_storage_box:v1:*:*:*:*:*:*:*", + "matchCriteriaId": "1A73E447-D78F-420B-B256-1F157A6DA364" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2023-06-19", + "matchCriteriaId": "8C6796ED-84F3-47E8-BD21-5CEBC1DD62E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:enbw:senec_storage_box:v2:*:*:*:*:*:*:*", + "matchCriteriaId": "300B219B-45CA-44C0-AC39-D94057FA8860" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2023-06-19", + "matchCriteriaId": "8C6796ED-84F3-47E8-BD21-5CEBC1DD62E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:enbw:senec_storage_box:v3:*:*:*:*:*:*:*", + "matchCriteriaId": "449C542C-CAE3-42A9-BF45-EE6E828A4EBE" + } + ] + } + ] + } + ], "references": [ { "url": "https://seclists.org/fulldisclosure/2023/Nov/2", - "source": "info@cert.vde.com" + "source": "info@cert.vde.com", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39172.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39172.json index bfc97be2c69..4f8e95d2f34 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39172.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39172.json @@ -2,16 +2,40 @@ "id": "CVE-2023-39172", "sourceIdentifier": "info@cert.vde.com", "published": "2023-12-07T14:15:07.883", - "lastModified": "2023-12-07T16:09:27.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:49:44.890", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The affected devices transmit sensitive information unencrypted allowing a remote unauthenticated attacker to capture and modify network traffic." + }, + { + "lang": "es", + "value": "Los dispositivos afectados transmiten informaci\u00f3n confidencial sin cifrar, lo que permite a un atacante remoto no autenticado capturar y modificar el tr\u00e1fico de la red." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + }, { "source": "info@cert.vde.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + }, { "source": "info@cert.vde.com", "type": "Secondary", @@ -46,10 +80,97 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF2C3F5B-266D-455B-944D-9EDBB0268439" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:enbw:senec_storage_box:v1:*:*:*:*:*:*:*", + "matchCriteriaId": "1A73E447-D78F-420B-B256-1F157A6DA364" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF2C3F5B-266D-455B-944D-9EDBB0268439" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:enbw:senec_storage_box:v2:*:*:*:*:*:*:*", + "matchCriteriaId": "300B219B-45CA-44C0-AC39-D94057FA8860" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:enbw:senec_storage_box_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF2C3F5B-266D-455B-944D-9EDBB0268439" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:enbw:senec_storage_box:v3:*:*:*:*:*:*:*", + "matchCriteriaId": "449C542C-CAE3-42A9-BF45-EE6E828A4EBE" + } + ] + } + ] + } + ], "references": [ { "url": "https://seclists.org/fulldisclosure/2023/Nov/4", - "source": "info@cert.vde.com" + "source": "info@cert.vde.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39326.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39326.json index b5df2ed4bac..b4ece48f6f5 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39326.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39326.json @@ -2,31 +2,111 @@ "id": "CVE-2023-39326", "sourceIdentifier": "security@golang.org", "published": "2023-12-06T17:15:07.147", - "lastModified": "2023-12-06T18:49:19.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:27:55.297", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small." + }, + { + "lang": "es", + "value": "Un remitente HTTP malicioso puede usar extensiones de fragmentos para hacer que un receptor que lea el cuerpo de una solicitud o respuesta lea muchos m\u00e1s bytes de la red que los que hay en el cuerpo. Un cliente HTTP malicioso puede aprovechar esto a\u00fan m\u00e1s para hacer que un servidor lea autom\u00e1ticamente una gran cantidad de datos (hasta aproximadamente 1 GiB) cuando un controlador no puede leer el cuerpo completo de una solicitud. Las extensiones fragmentadas son una caracter\u00edstica HTTP poco utilizada que permite incluir metadatos adicionales en el cuerpo de una solicitud o respuesta enviada utilizando la codificaci\u00f3n fragmentada. El lector de codificaci\u00f3n fragmentada net/http descarta estos metadatos. Un remitente puede aprovechar esto insertando un segmento de metadatos grande con cada byte transferido. El lector de fragmentos ahora produce un error si la proporci\u00f3n entre el cuerpo real y los bytes codificados es demasiado peque\u00f1a." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.20.12", + "matchCriteriaId": "17AC9A37-6678-490D-88C2-08DE6D37F16C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.21.0-0", + "versionEndExcluding": "1.21.5", + "matchCriteriaId": "F9B8295D-576D-410E-B65C-96DB303CBA5C" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://go.dev/cl/547335", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Patch" + ] }, { "url": "https://go.dev/issue/64433", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] }, { "url": "https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://pkg.go.dev/vuln/GO-2023-2382", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39538.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39538.json index 76e5f3ed4b5..c9a5d3f7cdf 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39538.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39538.json @@ -2,16 +2,40 @@ "id": "CVE-2023-39538", "sourceIdentifier": "biossecurity@ami.com", "published": "2023-12-06T16:15:07.277", - "lastModified": "2023-12-06T18:49:19.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:29:07.987", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "\nAMI AptioV contains a vulnerability in BIOS where a User may cause an unrestricted upload of a BMP Logo file with dangerous type by Local access. A successful exploit of this vulnerability may lead to a loss of Confidentiality, Integrity, and/or Availability.\u00a0\n\n\n\n\n\n" + }, + { + "lang": "es", + "value": "AMI AptioV contiene una vulnerabilidad en BIOS donde un usuario puede provocar una carga sin restricciones de un archivo de logotipo BMP con un tipo peligroso mediante acceso local. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar una p\u00e9rdida de confidencialidad, integridad y/o disponibilidad." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "biossecurity@ami.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + }, { "source": "biossecurity@ami.com", "type": "Secondary", @@ -50,10 +84,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ami:aptio_v:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7C73298F-5F7B-43DF-8772-567ACCE6D7FD" + } + ] + } + ] + } + ], "references": [ { "url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023009.pdf", - "source": "biossecurity@ami.com" + "source": "biossecurity@ami.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39539.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39539.json index 34ebbc51f7c..4bde069d4b9 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39539.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39539.json @@ -2,16 +2,40 @@ "id": "CVE-2023-39539", "sourceIdentifier": "biossecurity@ami.com", "published": "2023-12-06T16:15:07.510", - "lastModified": "2023-12-06T18:49:19.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:28:52.040", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "\nAMI AptioV contains a vulnerability in BIOS where a User may cause an unrestricted upload of a PNG Logo file with dangerous type by Local access. A successful exploit of this vulnerability may lead to a loss of Confidentiality, Integrity, and/or Availability.\u00a0\n\n\n\n\n\n" + }, + { + "lang": "es", + "value": "AMI AptioV contiene una vulnerabilidad en BIOS donde un usuario puede provocar una carga sin restricciones de un archivo de logotipo PNG con un tipo peligroso mediante acceso local. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar una p\u00e9rdida de confidencialidad, integridad y/o disponibilidad." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "biossecurity@ami.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + }, { "source": "biossecurity@ami.com", "type": "Secondary", @@ -50,10 +84,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ami:aptio_v:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7C73298F-5F7B-43DF-8772-567ACCE6D7FD" + } + ] + } + ] + } + ], "references": [ { "url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023009.pdf", - "source": "biossecurity@ami.com" + "source": "biossecurity@ami.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39909.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39909.json index 1b60c18c734..63ecdb04683 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39909.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39909.json @@ -2,19 +2,79 @@ "id": "CVE-2023-39909", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T18:15:07.547", - "lastModified": "2023-12-07T18:30:52.097", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T18:20:27.780", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Ericsson Network Manager before 23.2 mishandles Access Control and thus unauthenticated low-privilege users can access the NCM application." + }, + { + "lang": "es", + "value": "Ericsson Network Manager anterior a 23.2 maneja mal el control de acceso y, por lo tanto, los usuarios no autenticados con pocos privilegios pueden acceder a la aplicaci\u00f3n NCM." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ericsson:network_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.2", + "matchCriteriaId": "ED57F506-963F-4192-B5A9-FECE633F4236" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.gruppotim.it/it/footer/red-team.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40238.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40238.json index 16e3a2c3676..72823a9020c 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40238.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40238.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40238", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T04:15:06.790", - "lastModified": "2023-12-07T12:12:36.717", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T15:13:33.960", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,19 +14,110 @@ "value": "Se descubri\u00f3 un problema de LogoFAIL en BmpDecoderDxe en Insyde InsydeH2O con kernel 5.2 anterior a 05.28.47, 5.3 anterior a 05.37.47, 5.4 anterior a 05.45.47, 5.5 anterior a 05.53.47 y 5.6 anterior a 05.60.47 para ciertos dispositivos Lenovo. El an\u00e1lisis de im\u00e1genes de archivos de logotipos BMP manipulados puede copiar datos a una direcci\u00f3n espec\u00edfica durante la fase DXE de la ejecuci\u00f3n UEFI. Esto ocurre debido a un error de firma de enteros que involucra PixelHeight y PixelWidth durante la compresi\u00f3n RLE4/RLE8." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.2", + "versionEndExcluding": "5.2.05.28.47", + "matchCriteriaId": "789083DE-7DBF-4943-A1BE-B82472E6FA3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3", + "versionEndExcluding": "5.3.05.37.47", + "matchCriteriaId": "08AB501F-EF6C-42C2-996C-DDEF497A79BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4", + "versionEndExcluding": "5.4.05.45.47", + "matchCriteriaId": "D8015F0C-512D-46B6-9FCA-3FC015D33F43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.5.05.53.47", + "matchCriteriaId": "16CCE808-25A8-4EBE-82D8-4CA1792FE198" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "5.6.05.60.47", + "matchCriteriaId": "814A299E-F6E9-4A1A-A1AD-CC5E7E063FB8" + } + ] + } + ] + } + ], "references": [ { "url": "https://binarly.io/posts/finding_logofail_the_dangers_of_image_parsing_during_system_boot/index.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://www.insyde.com/security-pledge", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.insyde.com/security-pledge/SA-2023053", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40300.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40300.json index bd1299fc095..fa01534698b 100644 --- a/CVE-2023/CVE-2023-403xx/CVE-2023-40300.json +++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40300.json @@ -2,19 +2,78 @@ "id": "CVE-2023-40300", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T18:15:07.597", - "lastModified": "2023-12-07T18:30:52.097", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T18:55:01.573", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "NETSCOUT nGeniusPULSE 3.8 has a Hardcoded Cryptographic Key." + }, + { + "lang": "es", + "value": "NETSCOUT nGeniusPULSE 3.8 tiene una clave criptogr\u00e1fica codificada." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netscout:ngeniuspulse:3.8.0-0.2349.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BB6D702D-3E57-4E5A-9DEA-299566922543" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.netscout.com/securityadvisories", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-411xx/CVE-2023-41106.json b/CVE-2023/CVE-2023-411xx/CVE-2023-41106.json index 346ede30633..b8ffb37bbd6 100644 --- a/CVE-2023/CVE-2023-411xx/CVE-2023-41106.json +++ b/CVE-2023/CVE-2023-411xx/CVE-2023-41106.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41106", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T05:15:09.110", - "lastModified": "2023-12-07T12:12:36.717", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:08:33.227", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,19 +14,434 @@ "value": "Se descubri\u00f3 un problema en Zimbra Collaboration (ZCS) antes de 10.0.3. Un atacante puede obtener acceso a una cuenta de Zimbra. Esto tambi\u00e9n se solucion\u00f3 en el parche 35 9.0.0 y el parche 42 8.8.15." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.8.15", + "matchCriteriaId": "1A604F85-992D-4CCF-8630-0456B92429BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.3", + "matchCriteriaId": "C38B73CC-A184-446D-A585-B9C55F07EAC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*", + "matchCriteriaId": "1B17C1A7-0F0A-4E7C-8C0C-0BBB0BF66C82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:*", + "matchCriteriaId": "BA48C450-201C-4398-AB65-EF6F95FB0380" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:*", + "matchCriteriaId": "5F759114-CF2D-48BF-8D09-EBE8D1ED1949" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:*", + "matchCriteriaId": "AE8BD950-24A2-4AFF-B7EE-6EE115BD75D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:*", + "matchCriteriaId": "C43634F5-2946-44D2-8A50-B717374A8126" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:*", + "matchCriteriaId": "20315895-5410-4B88-B2D9-E9C5D79A64DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:*", + "matchCriteriaId": "BF405091-A832-4945-87EC-AA525F37DF91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:*", + "matchCriteriaId": "C9B6FFA8-CFD2-47C6-9475-79210CB9AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:*", + "matchCriteriaId": "964CA714-937C-4FC0-A1E9-07F846C786BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:*", + "matchCriteriaId": "DAF8F155-1406-46ED-A81F-BCC4CE525F43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:*", + "matchCriteriaId": "56A8F56B-3457-4C19-B213-3B04FEE8D7A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:*", + "matchCriteriaId": "B4F8D255-3F91-45FF-9133-4023BA688F9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:*", + "matchCriteriaId": "37BC4DF5-D111-4295-94FC-AA8929CDF2A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:*", + "matchCriteriaId": "A9D50108-0404-4791-8057-DB1786D311C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:*", + "matchCriteriaId": "F2A7E53F-8EAC-4DA9-8EAE-117759EFABEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:*", + "matchCriteriaId": "858727DB-AE6F-435D-B8FD-6C94C3400E40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:*", + "matchCriteriaId": "3FA6AC95-288C-4ABA-B2A7-47E4134EDC31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:*", + "matchCriteriaId": "4AA82728-5901-482A-83CF-F883D4B6A8E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:*", + "matchCriteriaId": "7E762792-542E-43D0-A95A-E7F48F328A28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:*", + "matchCriteriaId": "6DD4641A-EC23-4B1A-8729-9AECD70390AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:*", + "matchCriteriaId": "E0E3E825-1D1E-4ECD-B306-DD8BDCDD0547" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:*", + "matchCriteriaId": "840F98DC-57F1-4054-A6C1-6E7F0340AC2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:*", + "matchCriteriaId": "EE2A1305-68B7-4CB7-837F-4EDE2EBED507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:*", + "matchCriteriaId": "21768A61-7578-4EEC-A23B-FEC10CAA9EDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p30:*:*:*:*:*:*", + "matchCriteriaId": "CA758408-4302-43BC-BDC9-1B70EC5D2FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p31:*:*:*:*:*:*", + "matchCriteriaId": "822CDEBC-0650-4970-B46F-06F505993086" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p32:*:*:*:*:*:*", + "matchCriteriaId": "971B5005-4676-4D93-A7DD-6AFDC8D0BEEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p33:*:*:*:*:*:*", + "matchCriteriaId": "81BC6A7F-D014-44B3-9361-20DB256D3C8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p34:*:*:*:*:*:*", + "matchCriteriaId": "6A3DC694-4CCC-4E9F-B6E9-891B1DF115C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p35:*:*:*:*:*:*", + "matchCriteriaId": "3810385E-95E8-491E-8281-394125DB04F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p37:*:*:*:*:*:*", + "matchCriteriaId": "C08B5A0A-2935-4FEB-9133-4B35E1AB0CDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:*", + "matchCriteriaId": "661403E7-1D65-4710-8413-47D74FF65BE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p40:*:*:*:*:*:*", + "matchCriteriaId": "4CD3AEF8-0667-40B9-BCAA-6C9CA7D9C495" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p41:*:*:*:*:*:*", + "matchCriteriaId": "A0F8BB82-32E4-463D-B719-8E5186CAAECC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:*", + "matchCriteriaId": "0695D2E0-45B3-493C-BA6D-471B90C0ACC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:*", + "matchCriteriaId": "714FAFE6-68AE-4304-B040-48BC46F85A2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:*", + "matchCriteriaId": "73FC2D2D-8BBD-4259-8B35-0D9BFA40567B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:*", + "matchCriteriaId": "AB97E9E6-CC4A-458D-B731-6D51130B942C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:*", + "matchCriteriaId": "BA688C43-846A-4C4A-AEDB-113D967D3D73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*", + "matchCriteriaId": "685D9652-2934-4C13-8B36-40582C79BFC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:*", + "matchCriteriaId": "5E4DF01A-1AA9-47E8-82FD-65A02ECA1376" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "BDE59185-B917-4A81-8DE4-C65A079F52FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "BA3ED95F-95F2-4676-8EAF-B4B9EB64B260" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "4BB93336-CC3C-4B7F-B194-7DED036ABBAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "876F1675-F65C-4E86-ADBD-36EB8D8A997D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "2306F526-9C56-4A57-AA9B-02F2D6058C97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:*", + "matchCriteriaId": "F9EA2A61-67AA-4B7E-BC6E-80EB1363EF85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:*", + "matchCriteriaId": "C77A35B7-96F6-43A7-A747-C6AEEDE961E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:*", + "matchCriteriaId": "DC35882B-E709-42D8-8800-F1B734CEAFC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:*", + "matchCriteriaId": "B7A47276-F241-4A68-9458-E1481EBDC5E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "12D0D469-6C9B-4B66-9581-DC319773238A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:*", + "matchCriteriaId": "40629BEB-DF4B-4FB8-8D3D-7BAC43C90766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:*", + "matchCriteriaId": "9503131F-CC23-4545-AE9C-9714B287CC25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:*", + "matchCriteriaId": "B4CE2D12-AD31-4FED-AD0F-ADF64E92E1B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:*", + "matchCriteriaId": "8113A4E3-AA96-4382-815D-6FD88BA42EC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:*", + "matchCriteriaId": "DC8C28E0-6C51-41EE-A7B2-DB185D1D8FD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:*", + "matchCriteriaId": "BC19F11D-23D9-429D-A957-D67F23A40A01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:*", + "matchCriteriaId": "AAFA2EE7-C965-4F27-8CAE-E607A9F202AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:*", + "matchCriteriaId": "1D09DCF6-1C8F-4CA1-B7D4-AFDD4EB35771" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "C52705E6-2C6B-47BC-A0CD-F6AAE0BFC302" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p33:*:*:*:*:*:*", + "matchCriteriaId": "D659AE6A-591E-4D5B-9781-9648250F5576" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p34:*:*:*:*:*:*", + "matchCriteriaId": "E4054E3E-561C-4B1C-A615-3CCE5CB69D77" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "33F50D8C-7027-4A8D-8E95-98C224283772" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "82000BA4-1781-4312-A7BD-92EC94D137AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "4B52D301-2559-457A-8FFB-F0915299355A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "7215AE2C-8A33-4AB9-88D5-7C8CD11E806C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:*", + "matchCriteriaId": "8D859F77-8E39-4D46-BC90-C5C1D805A666" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "CDC810C7-45DA-4BDF-9138-2D3B2750243E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "E09D95A4-764D-4E0B-8605-1D94FD548AB2" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2023/11/17/2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://wiki.zimbra.com/wiki/Security_Center", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-411xx/CVE-2023-41172.json b/CVE-2023/CVE-2023-411xx/CVE-2023-41172.json index 3c768e53cba..7b3fa0b55af 100644 --- a/CVE-2023/CVE-2023-411xx/CVE-2023-41172.json +++ b/CVE-2023/CVE-2023-411xx/CVE-2023-41172.json @@ -2,19 +2,78 @@ "id": "CVE-2023-41172", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T18:15:07.937", - "lastModified": "2023-12-07T18:30:52.097", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T18:11:23.157", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "NetScout nGeniusONE 6.3.4 build 2298 allows a Stored Cross-Site scripting vulnerability (issue 4 of 4)." + }, + { + "lang": "es", + "value": "NetScout nGeniusONE 6.3.4 build 2298 permite una vulnerabilidad de Cross-Site Scripting (XSS) Almacenada (problema 4 de 4)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netscout:ngeniusone:6.3.4:build2298:*:*:*:*:*:*", + "matchCriteriaId": "5E324F69-A8E5-47DF-AEEF-FCC789220B59" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.netscout.com/securityadvisories", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-418xx/CVE-2023-41804.json b/CVE-2023/CVE-2023-418xx/CVE-2023-41804.json index 63fc6185b9f..257e0467a7a 100644 --- a/CVE-2023/CVE-2023-418xx/CVE-2023-41804.json +++ b/CVE-2023/CVE-2023-418xx/CVE-2023-41804.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41804", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-07T11:15:07.807", - "lastModified": "2023-12-07T12:12:22.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:59:18.847", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brainstormforce:starter_templates:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.5", + "matchCriteriaId": "65132DDD-016E-4101-A907-2D99ED33338F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/astra-sites/wordpress-starter-templates-plugin-3-2-4-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41905.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41905.json index 419fe652a91..a5e65139bd7 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41905.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41905.json @@ -2,19 +2,78 @@ "id": "CVE-2023-41905", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T18:15:07.980", - "lastModified": "2023-12-07T18:30:52.097", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T18:10:29.040", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "NETSCOUT nGeniusONE 6.3.4 build 2298 allows a Reflected Cross-Site scripting (XSS) vulnerability by an authenticated user." + }, + { + "lang": "es", + "value": "NETSCOUT nGeniusONE 6.3.4 build 2298 permite una vulnerabilidad de Cross-Site scripting (XSS) Reflejada por parte de un usuario autenticado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netscout:ngeniusone:6.3.4:build2298:*:*:*:*:*:*", + "matchCriteriaId": "5E324F69-A8E5-47DF-AEEF-FCC789220B59" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.netscout.com/securityadvisories", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41913.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41913.json index 83ca5ab4728..66c795e6209 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41913.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41913.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41913", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T05:15:09.173", - "lastModified": "2023-12-07T12:12:36.717", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:07:01.363", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,75 @@ "value": "strongSwan anterior a 5.9.12 tiene un desbordamiento del b\u00fafer y una posible ejecuci\u00f3n remota de c\u00f3digo no autenticado a trav\u00e9s de un valor p\u00fablico DH que excede el b\u00fafer interno en el proxy DH de charon-tkm. La primera versi\u00f3n afectada es la 5.3.0. Un ataque puede ocurrir a trav\u00e9s de un mensaje IKE_SA_INIT manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3.0", + "versionEndExcluding": "5.9.12", + "matchCriteriaId": "C5256E77-93AF-47BF-BD3F-0148F8E9D0B4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/strongswan/strongswan/releases", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-41913%29.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42580.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42580.json index f83cd9e601a..52cc8509a06 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42580.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42580.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42580", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-12-05T03:15:19.120", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:09:19.990", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:samsung:galaxy_store:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.5.64.4", + "matchCriteriaId": "0ACEF30C-D21F-488C-A1D5-55CEEE49C724" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=12", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42581.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42581.json index 36a2b086d74..358e61dd365 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42581.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42581.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42581", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-12-05T03:15:19.293", - "lastModified": "2023-12-11T20:33:24.510", + "lastModified": "2023-12-12T17:08:44.080", "vulnStatus": "Analyzed", "descriptions": [ { @@ -21,20 +21,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, - "impactScore": 5.9 + "impactScore": 3.6 }, { "source": "mobile.security@samsung.com", diff --git a/CVE-2023/CVE-2023-431xx/CVE-2023-43102.json b/CVE-2023/CVE-2023-431xx/CVE-2023-43102.json index 9fc19da6caf..47faa87432c 100644 --- a/CVE-2023/CVE-2023-431xx/CVE-2023-43102.json +++ b/CVE-2023/CVE-2023-431xx/CVE-2023-43102.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43102", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T06:15:54.490", - "lastModified": "2023-12-07T12:12:36.717", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:11:13.437", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,436 @@ "value": "Se descubri\u00f3 un problema en Zimbra Collaboration (ZCS) antes de 10.0.4. Se puede aprovechar un problema XSS para acceder al buz\u00f3n de correo de un usuario autenticado. Esto tambi\u00e9n se solucion\u00f3 en el parche 43 8.8.15 y el parche 36 9.0.0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.8.15", + "matchCriteriaId": "1A604F85-992D-4CCF-8630-0456B92429BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.4", + "matchCriteriaId": "15BA556D-FE45-42D3-A625-DEC85C82E170" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*", + "matchCriteriaId": "1B17C1A7-0F0A-4E7C-8C0C-0BBB0BF66C82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:*", + "matchCriteriaId": "BA48C450-201C-4398-AB65-EF6F95FB0380" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:*", + "matchCriteriaId": "5F759114-CF2D-48BF-8D09-EBE8D1ED1949" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:*", + "matchCriteriaId": "AE8BD950-24A2-4AFF-B7EE-6EE115BD75D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:*", + "matchCriteriaId": "C43634F5-2946-44D2-8A50-B717374A8126" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:*", + "matchCriteriaId": "20315895-5410-4B88-B2D9-E9C5D79A64DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:*", + "matchCriteriaId": "BF405091-A832-4945-87EC-AA525F37DF91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:*", + "matchCriteriaId": "C9B6FFA8-CFD2-47C6-9475-79210CB9AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:*", + "matchCriteriaId": "964CA714-937C-4FC0-A1E9-07F846C786BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:*", + "matchCriteriaId": "DAF8F155-1406-46ED-A81F-BCC4CE525F43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:*", + "matchCriteriaId": "56A8F56B-3457-4C19-B213-3B04FEE8D7A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:*", + "matchCriteriaId": "B4F8D255-3F91-45FF-9133-4023BA688F9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:*", + "matchCriteriaId": "37BC4DF5-D111-4295-94FC-AA8929CDF2A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:*", + "matchCriteriaId": "A9D50108-0404-4791-8057-DB1786D311C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:*", + "matchCriteriaId": "F2A7E53F-8EAC-4DA9-8EAE-117759EFABEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:*", + "matchCriteriaId": "858727DB-AE6F-435D-B8FD-6C94C3400E40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:*", + "matchCriteriaId": "3FA6AC95-288C-4ABA-B2A7-47E4134EDC31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:*", + "matchCriteriaId": "4AA82728-5901-482A-83CF-F883D4B6A8E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:*", + "matchCriteriaId": "7E762792-542E-43D0-A95A-E7F48F328A28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:*", + "matchCriteriaId": "6DD4641A-EC23-4B1A-8729-9AECD70390AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:*", + "matchCriteriaId": "E0E3E825-1D1E-4ECD-B306-DD8BDCDD0547" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:*", + "matchCriteriaId": "840F98DC-57F1-4054-A6C1-6E7F0340AC2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:*", + "matchCriteriaId": "EE2A1305-68B7-4CB7-837F-4EDE2EBED507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:*", + "matchCriteriaId": "21768A61-7578-4EEC-A23B-FEC10CAA9EDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p30:*:*:*:*:*:*", + "matchCriteriaId": "CA758408-4302-43BC-BDC9-1B70EC5D2FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p31:*:*:*:*:*:*", + "matchCriteriaId": "822CDEBC-0650-4970-B46F-06F505993086" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p32:*:*:*:*:*:*", + "matchCriteriaId": "971B5005-4676-4D93-A7DD-6AFDC8D0BEEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p33:*:*:*:*:*:*", + "matchCriteriaId": "81BC6A7F-D014-44B3-9361-20DB256D3C8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p34:*:*:*:*:*:*", + "matchCriteriaId": "6A3DC694-4CCC-4E9F-B6E9-891B1DF115C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p35:*:*:*:*:*:*", + "matchCriteriaId": "3810385E-95E8-491E-8281-394125DB04F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p37:*:*:*:*:*:*", + "matchCriteriaId": "C08B5A0A-2935-4FEB-9133-4B35E1AB0CDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:*", + "matchCriteriaId": "661403E7-1D65-4710-8413-47D74FF65BE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p40:*:*:*:*:*:*", + "matchCriteriaId": "4CD3AEF8-0667-40B9-BCAA-6C9CA7D9C495" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p41:*:*:*:*:*:*", + "matchCriteriaId": "A0F8BB82-32E4-463D-B719-8E5186CAAECC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p42:*:*:*:*:*:*", + "matchCriteriaId": "9605C0CF-E5DF-497A-B298-D64ABCDAF88E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:*", + "matchCriteriaId": "0695D2E0-45B3-493C-BA6D-471B90C0ACC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:*", + "matchCriteriaId": "714FAFE6-68AE-4304-B040-48BC46F85A2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:*", + "matchCriteriaId": "73FC2D2D-8BBD-4259-8B35-0D9BFA40567B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:*", + "matchCriteriaId": "AB97E9E6-CC4A-458D-B731-6D51130B942C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:*", + "matchCriteriaId": "BA688C43-846A-4C4A-AEDB-113D967D3D73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*", + "matchCriteriaId": "685D9652-2934-4C13-8B36-40582C79BFC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:*", + "matchCriteriaId": "5E4DF01A-1AA9-47E8-82FD-65A02ECA1376" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "BDE59185-B917-4A81-8DE4-C65A079F52FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "BA3ED95F-95F2-4676-8EAF-B4B9EB64B260" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "4BB93336-CC3C-4B7F-B194-7DED036ABBAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "876F1675-F65C-4E86-ADBD-36EB8D8A997D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "2306F526-9C56-4A57-AA9B-02F2D6058C97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:*", + "matchCriteriaId": "F9EA2A61-67AA-4B7E-BC6E-80EB1363EF85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:*", + "matchCriteriaId": "C77A35B7-96F6-43A7-A747-C6AEEDE961E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:*", + "matchCriteriaId": "DC35882B-E709-42D8-8800-F1B734CEAFC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:*", + "matchCriteriaId": "B7A47276-F241-4A68-9458-E1481EBDC5E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "12D0D469-6C9B-4B66-9581-DC319773238A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:*", + "matchCriteriaId": "40629BEB-DF4B-4FB8-8D3D-7BAC43C90766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:*", + "matchCriteriaId": "9503131F-CC23-4545-AE9C-9714B287CC25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:*", + "matchCriteriaId": "B4CE2D12-AD31-4FED-AD0F-ADF64E92E1B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:*", + "matchCriteriaId": "8113A4E3-AA96-4382-815D-6FD88BA42EC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:*", + "matchCriteriaId": "DC8C28E0-6C51-41EE-A7B2-DB185D1D8FD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:*", + "matchCriteriaId": "BC19F11D-23D9-429D-A957-D67F23A40A01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:*", + "matchCriteriaId": "AAFA2EE7-C965-4F27-8CAE-E607A9F202AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:*", + "matchCriteriaId": "1D09DCF6-1C8F-4CA1-B7D4-AFDD4EB35771" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "C52705E6-2C6B-47BC-A0CD-F6AAE0BFC302" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p33:*:*:*:*:*:*", + "matchCriteriaId": "D659AE6A-591E-4D5B-9781-9648250F5576" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p34:*:*:*:*:*:*", + "matchCriteriaId": "E4054E3E-561C-4B1C-A615-3CCE5CB69D77" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p35:*:*:*:*:*:*", + "matchCriteriaId": "4FA0E9C4-25E4-4CD6-B88A-02B413385866" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "33F50D8C-7027-4A8D-8E95-98C224283772" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "82000BA4-1781-4312-A7BD-92EC94D137AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "4B52D301-2559-457A-8FFB-F0915299355A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "7215AE2C-8A33-4AB9-88D5-7C8CD11E806C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:*", + "matchCriteriaId": "8D859F77-8E39-4D46-BC90-C5C1D805A666" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "CDC810C7-45DA-4BDF-9138-2D3B2750243E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "E09D95A4-764D-4E0B-8605-1D94FD548AB2" + } + ] + } + ] + } + ], "references": [ { "url": "https://wiki.zimbra.com/wiki/Security_Center", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-431xx/CVE-2023-43103.json b/CVE-2023/CVE-2023-431xx/CVE-2023-43103.json index 5bc3c432478..03000b4be38 100644 --- a/CVE-2023/CVE-2023-431xx/CVE-2023-43103.json +++ b/CVE-2023/CVE-2023-431xx/CVE-2023-43103.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43103", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T06:15:54.630", - "lastModified": "2023-12-07T12:12:36.717", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:10:33.093", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,436 @@ "value": "Se descubri\u00f3 un problema XSS en un endpoint web en Zimbra Collaboration (ZCS) anterior a 10.0.4 a trav\u00e9s de un par\u00e1metro no sanitizado. Esto tambi\u00e9n se solucion\u00f3 en el parche 43 8.8.15 y el parche 36 9.0.0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.8.15", + "matchCriteriaId": "1A604F85-992D-4CCF-8630-0456B92429BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.4", + "matchCriteriaId": "15BA556D-FE45-42D3-A625-DEC85C82E170" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*", + "matchCriteriaId": "1B17C1A7-0F0A-4E7C-8C0C-0BBB0BF66C82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:*", + "matchCriteriaId": "BA48C450-201C-4398-AB65-EF6F95FB0380" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:*", + "matchCriteriaId": "5F759114-CF2D-48BF-8D09-EBE8D1ED1949" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:*", + "matchCriteriaId": "AE8BD950-24A2-4AFF-B7EE-6EE115BD75D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:*", + "matchCriteriaId": "C43634F5-2946-44D2-8A50-B717374A8126" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:*", + "matchCriteriaId": "20315895-5410-4B88-B2D9-E9C5D79A64DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:*", + "matchCriteriaId": "BF405091-A832-4945-87EC-AA525F37DF91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:*", + "matchCriteriaId": "C9B6FFA8-CFD2-47C6-9475-79210CB9AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:*", + "matchCriteriaId": "964CA714-937C-4FC0-A1E9-07F846C786BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:*", + "matchCriteriaId": "DAF8F155-1406-46ED-A81F-BCC4CE525F43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:*", + "matchCriteriaId": "56A8F56B-3457-4C19-B213-3B04FEE8D7A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:*", + "matchCriteriaId": "B4F8D255-3F91-45FF-9133-4023BA688F9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:*", + "matchCriteriaId": "37BC4DF5-D111-4295-94FC-AA8929CDF2A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:*", + "matchCriteriaId": "A9D50108-0404-4791-8057-DB1786D311C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:*", + "matchCriteriaId": "F2A7E53F-8EAC-4DA9-8EAE-117759EFABEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:*", + "matchCriteriaId": "858727DB-AE6F-435D-B8FD-6C94C3400E40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:*", + "matchCriteriaId": "3FA6AC95-288C-4ABA-B2A7-47E4134EDC31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:*", + "matchCriteriaId": "4AA82728-5901-482A-83CF-F883D4B6A8E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:*", + "matchCriteriaId": "7E762792-542E-43D0-A95A-E7F48F328A28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:*", + "matchCriteriaId": "6DD4641A-EC23-4B1A-8729-9AECD70390AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:*", + "matchCriteriaId": "E0E3E825-1D1E-4ECD-B306-DD8BDCDD0547" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:*", + "matchCriteriaId": "840F98DC-57F1-4054-A6C1-6E7F0340AC2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:*", + "matchCriteriaId": "EE2A1305-68B7-4CB7-837F-4EDE2EBED507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:*", + "matchCriteriaId": "21768A61-7578-4EEC-A23B-FEC10CAA9EDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p30:*:*:*:*:*:*", + "matchCriteriaId": "CA758408-4302-43BC-BDC9-1B70EC5D2FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p31:*:*:*:*:*:*", + "matchCriteriaId": "822CDEBC-0650-4970-B46F-06F505993086" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p32:*:*:*:*:*:*", + "matchCriteriaId": "971B5005-4676-4D93-A7DD-6AFDC8D0BEEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p33:*:*:*:*:*:*", + "matchCriteriaId": "81BC6A7F-D014-44B3-9361-20DB256D3C8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p34:*:*:*:*:*:*", + "matchCriteriaId": "6A3DC694-4CCC-4E9F-B6E9-891B1DF115C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p35:*:*:*:*:*:*", + "matchCriteriaId": "3810385E-95E8-491E-8281-394125DB04F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p37:*:*:*:*:*:*", + "matchCriteriaId": "C08B5A0A-2935-4FEB-9133-4B35E1AB0CDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:*", + "matchCriteriaId": "661403E7-1D65-4710-8413-47D74FF65BE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p40:*:*:*:*:*:*", + "matchCriteriaId": "4CD3AEF8-0667-40B9-BCAA-6C9CA7D9C495" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p41:*:*:*:*:*:*", + "matchCriteriaId": "A0F8BB82-32E4-463D-B719-8E5186CAAECC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p42:*:*:*:*:*:*", + "matchCriteriaId": "9605C0CF-E5DF-497A-B298-D64ABCDAF88E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:*", + "matchCriteriaId": "0695D2E0-45B3-493C-BA6D-471B90C0ACC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:*", + "matchCriteriaId": "714FAFE6-68AE-4304-B040-48BC46F85A2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:*", + "matchCriteriaId": "73FC2D2D-8BBD-4259-8B35-0D9BFA40567B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:*", + "matchCriteriaId": "AB97E9E6-CC4A-458D-B731-6D51130B942C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:*", + "matchCriteriaId": "BA688C43-846A-4C4A-AEDB-113D967D3D73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*", + "matchCriteriaId": "685D9652-2934-4C13-8B36-40582C79BFC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:*", + "matchCriteriaId": "5E4DF01A-1AA9-47E8-82FD-65A02ECA1376" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "BDE59185-B917-4A81-8DE4-C65A079F52FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "BA3ED95F-95F2-4676-8EAF-B4B9EB64B260" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "4BB93336-CC3C-4B7F-B194-7DED036ABBAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "876F1675-F65C-4E86-ADBD-36EB8D8A997D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "2306F526-9C56-4A57-AA9B-02F2D6058C97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:*", + "matchCriteriaId": "F9EA2A61-67AA-4B7E-BC6E-80EB1363EF85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:*", + "matchCriteriaId": "C77A35B7-96F6-43A7-A747-C6AEEDE961E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:*", + "matchCriteriaId": "DC35882B-E709-42D8-8800-F1B734CEAFC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:*", + "matchCriteriaId": "B7A47276-F241-4A68-9458-E1481EBDC5E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "12D0D469-6C9B-4B66-9581-DC319773238A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:*", + "matchCriteriaId": "40629BEB-DF4B-4FB8-8D3D-7BAC43C90766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:*", + "matchCriteriaId": "9503131F-CC23-4545-AE9C-9714B287CC25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:*", + "matchCriteriaId": "B4CE2D12-AD31-4FED-AD0F-ADF64E92E1B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:*", + "matchCriteriaId": "8113A4E3-AA96-4382-815D-6FD88BA42EC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:*", + "matchCriteriaId": "DC8C28E0-6C51-41EE-A7B2-DB185D1D8FD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:*", + "matchCriteriaId": "BC19F11D-23D9-429D-A957-D67F23A40A01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:*", + "matchCriteriaId": "AAFA2EE7-C965-4F27-8CAE-E607A9F202AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:*", + "matchCriteriaId": "1D09DCF6-1C8F-4CA1-B7D4-AFDD4EB35771" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "C52705E6-2C6B-47BC-A0CD-F6AAE0BFC302" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p33:*:*:*:*:*:*", + "matchCriteriaId": "D659AE6A-591E-4D5B-9781-9648250F5576" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p34:*:*:*:*:*:*", + "matchCriteriaId": "E4054E3E-561C-4B1C-A615-3CCE5CB69D77" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p35:*:*:*:*:*:*", + "matchCriteriaId": "4FA0E9C4-25E4-4CD6-B88A-02B413385866" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "33F50D8C-7027-4A8D-8E95-98C224283772" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "82000BA4-1781-4312-A7BD-92EC94D137AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "4B52D301-2559-457A-8FFB-F0915299355A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "7215AE2C-8A33-4AB9-88D5-7C8CD11E806C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:*", + "matchCriteriaId": "8D859F77-8E39-4D46-BC90-C5C1D805A666" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "CDC810C7-45DA-4BDF-9138-2D3B2750243E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "E09D95A4-764D-4E0B-8605-1D94FD548AB2" + } + ] + } + ] + } + ], "references": [ { "url": "https://wiki.zimbra.com/wiki/Security_Center", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43364.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43364.json new file mode 100644 index 00000000000..7f8e7ef66c7 --- /dev/null +++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43364.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-43364", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T18:15:22.887", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "main.py in Searchor before 2.4.2 uses eval on CLI input, which may cause unexpected code execution." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ArjunSharda/Searchor/commit/16016506f7bf92b0f21f51841d599126d6fcd15b", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ArjunSharda/Searchor/pull/130", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/advisories/GHSA-66m2-493m-crh2", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/nexis-nexis/Searchor-2.4.0-POC-Exploit-", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/nikn0laty/Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4421.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4421.json new file mode 100644 index 00000000000..e3f8f821a6d --- /dev/null +++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4421.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-4421", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-12-12T17:15:08.347", + "lastModified": "2023-12-12T17:22:30.567", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The NSS code used for checking PKCS#1 v1.5 was leaking information useful in mounting Bleichenbacher-like attacks. Both the overall correctness of the padding as well as the length of the encrypted message was leaking through timing side-channel. By sending large number of attacker-selected ciphertexts, the attacker would be able to decrypt a previously intercepted PKCS#1 v1.5 ciphertext (for example, to decrypt a TLS session that used RSA key exchange), or forge a signature using the victim's key. The issue was fixed by implementing the implicit rejection algorithm, in which the NSS returns a deterministic random message in case invalid padding is detected, as proposed in the Marvin Attack paper. This vulnerability affects NSS < 3.61." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1651411", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-53/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45083.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45083.json index 0708b679085..14210df28af 100644 --- a/CVE-2023/CVE-2023-450xx/CVE-2023-45083.json +++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45083.json @@ -2,16 +2,40 @@ "id": "CVE-2023-45083", "sourceIdentifier": "0a72a055-908d-47f5-a16a-1f09049c16c6", "published": "2023-12-05T17:15:07.950", - "lastModified": "2023-12-05T20:13:47.300", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:40:40.463", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An Improper Privilege Management vulnerability exists in HyperCloud that will impact the ability for a user to authenticate against the management plane.\n\nAn authenticated admin-level user may be able to delete the \"admin\" or \"serveradmin\" users, which prevents authentication from subsequently succeeding.\n\nThis issue affects HyperCloud versions 1.0 to any release before 2.1.\n\n" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de gesti\u00f3n de privilegios inadecuada en HyperCloud que afectar\u00e1 la capacidad de un usuario para autenticarse en el plano de gesti\u00f3n. Un usuario de nivel de administrador autenticado puede eliminar los usuarios \"admin\" o \"serveadmin\", lo que impide que la autenticaci\u00f3n se realice correctamente posteriormente. Este problema afecta a las versiones 1.0 de HyperCloud hasta cualquier versi\u00f3n anterior a la 2.1." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "0a72a055-908d-47f5-a16a-1f09049c16c6", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + }, { "source": "0a72a055-908d-47f5-a16a-1f09049c16c6", "type": "Secondary", @@ -46,10 +80,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:softiron:hypercloud:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0", + "versionEndExcluding": "2.1.0", + "matchCriteriaId": "554F36F7-6344-4F7A-A1BE-196927DD04E5" + } + ] + } + ] + } + ], "references": [ { "url": "https://advisories.softiron.cloud", - "source": "0a72a055-908d-47f5-a16a-1f09049c16c6" + "source": "0a72a055-908d-47f5-a16a-1f09049c16c6", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45084.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45084.json index b22ecf66716..e983bd128df 100644 --- a/CVE-2023/CVE-2023-450xx/CVE-2023-45084.json +++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45084.json @@ -2,16 +2,40 @@ "id": "CVE-2023-45084", "sourceIdentifier": "0a72a055-908d-47f5-a16a-1f09049c16c6", "published": "2023-12-05T17:15:08.183", - "lastModified": "2023-12-05T20:13:47.300", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:41:49.943", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue exists in SoftIron HyperCloud where drive caddy removal and reinsertion without a reboot may erroneously cause the system to recognize the caddy as new media and wipe all data on the drives due to a missing synchronization flaw, which impacts data availability and integrity.\n\nThis issue only impacts SoftIron HyperCloud \"density\" storage nodes running HyperCloud software versions 1.0 to before 2.0.3.\n\n" + }, + { + "lang": "es", + "value": "Existe un problema en SoftIron HyperCloud donde la extracci\u00f3n y reinserci\u00f3n del drive caddy sin reiniciar puede hacer que el sistema reconozca err\u00f3neamente el caddy como un medio nuevo y borre todos los datos de las unidades debido a una falla de sincronizaci\u00f3n faltante, lo que afecta la disponibilidad e integridad de los datos. Este problema solo afecta a los nodos de almacenamiento de \"density\" de SoftIron HyperCloud que ejecutan el software HyperCloud desde la versi\u00f3n 1.0 hasta la 2.0.3 anterior." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.2 + }, { "source": "0a72a055-908d-47f5-a16a-1f09049c16c6", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-662" + } + ] + }, { "source": "0a72a055-908d-47f5-a16a-1f09049c16c6", "type": "Secondary", @@ -46,10 +80,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:softiron:hypercloud:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0", + "versionEndExcluding": "2.0.3", + "matchCriteriaId": "1E1D94F5-3EE0-4D00-BF00-C08BB922F813" + } + ] + } + ] + } + ], "references": [ { "url": "https://advisories.softiron.cloud", - "source": "0a72a055-908d-47f5-a16a-1f09049c16c6" + "source": "0a72a055-908d-47f5-a16a-1f09049c16c6", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45085.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45085.json index e86583ec7f2..4f389fd04d0 100644 --- a/CVE-2023/CVE-2023-450xx/CVE-2023-45085.json +++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45085.json @@ -2,16 +2,40 @@ "id": "CVE-2023-45085", "sourceIdentifier": "0a72a055-908d-47f5-a16a-1f09049c16c6", "published": "2023-12-05T17:15:08.400", - "lastModified": "2023-12-05T20:13:47.300", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:14:09.460", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue exists in SoftIron HyperCloud where compute nodes may come online immediately without following the correct initialization process.\u00a0 In this instance, workloads may be scheduled on these nodes and deploy to a failed or erroneous state, which impacts the availability of these workloads that may be deployed during this time window.\n\nThis issue impacts HyperCloud versions from 2.0.0 to before 2.0.3.\n\n" + }, + { + "lang": "es", + "value": "Existe un problema en SoftIron HyperCloud donde los nodos de c\u00e1lculo pueden conectarse inmediatamente sin seguir el proceso de inicializaci\u00f3n correcto. En este caso, las cargas de trabajo pueden programarse en estos nodos y desplegarse en un estado fallido o err\u00f3neo, lo que afecta la disponibilidad de estas cargas de trabajo que pueden implementarse durante este per\u00edodo de tiempo. Este problema afecta a las versiones de HyperCloud desde la 2.0.0 hasta la 2.0.3 anterior." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + }, { "source": "0a72a055-908d-47f5-a16a-1f09049c16c6", "type": "Secondary", @@ -34,10 +58,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:softiron:hypercloud:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.0.3", + "matchCriteriaId": "FCFF9E8A-301B-4195-B0C7-0A97B7C64DAF" + } + ] + } + ] + } + ], "references": [ { "url": "https://advisories.softiron.cloud", - "source": "0a72a055-908d-47f5-a16a-1f09049c16c6" + "source": "0a72a055-908d-47f5-a16a-1f09049c16c6", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45285.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45285.json index 4a3b29632bf..8a01ac0fc23 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45285.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45285.json @@ -2,31 +2,110 @@ "id": "CVE-2023-45285", "sourceIdentifier": "security@golang.org", "published": "2023-12-06T17:15:07.320", - "lastModified": "2023-12-06T18:49:19.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:27:36.273", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Using go get to fetch a module with the \".git\" suffix may unexpectedly fallback to the insecure \"git://\" protocol if the module is unavailable via the secure \"https://\" and \"git+ssh://\" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off)." + }, + { + "lang": "es", + "value": "El uso de go get para buscar un m\u00f3dulo con el sufijo \".git\" puede recurrir inesperadamente al protocolo inseguro \"git://\" si el m\u00f3dulo no est\u00e1 disponible a trav\u00e9s de \"https://\" y \"git+ssh://\" seguros, protocolos, incluso si GOINSECURE no est\u00e1 configurado para dicho m\u00f3dulo. Esto s\u00f3lo afecta a los usuarios que no utilizan el proxy del m\u00f3dulo y est\u00e1n obteniendo m\u00f3dulos directamente (es decir, GOPROXY = desactivado)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.20.12", + "matchCriteriaId": "17AC9A37-6678-490D-88C2-08DE6D37F16C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.21.0-0", + "versionEndExcluding": "1.21.5", + "matchCriteriaId": "F9B8295D-576D-410E-B65C-96DB303CBA5C" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://go.dev/cl/540257", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Patch" + ] }, { "url": "https://go.dev/issue/63845", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://pkg.go.dev/vuln/GO-2023-2383", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45287.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45287.json index d56612ef617..5ab95ef5a42 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45287.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45287.json @@ -2,35 +2,108 @@ "id": "CVE-2023-45287", "sourceIdentifier": "security@golang.org", "published": "2023-12-05T17:15:08.570", - "lastModified": "2023-12-05T20:13:47.300", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:26:44.020", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels." + }, + { + "lang": "es", + "value": "Antes de Go 1.20, los intercambios de claves TLS basados en RSA utilizaban la librer\u00eda math/big, que no es un tiempo constante. Se aplic\u00f3 blinding RSA para prevenir ataques sincronizados, pero el an\u00e1lisis muestra que esto puede no haber sido completamente efectivo. En particular, parece que la eliminaci\u00f3n del relleno PKCS#1 puede filtrar informaci\u00f3n de tiempo, que a su vez podr\u00eda usarse para recuperar bits de clave de sesi\u00f3n. En Go 1.20, la librer\u00eda crypto/tls cambi\u00f3 a una implementaci\u00f3n RSA de tiempo completamente constante, que no creemos que muestre ning\u00fan canal lateral de temporizaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.20.0", + "matchCriteriaId": "A96BDB4B-F1DA-4948-8E56-8B4933BB8BC2" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://go.dev/cl/326012/26", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://go.dev/issue/20654", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://groups.google.com/g/golang-announce/c/QMK8IQALDvA", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Release Notes" + ] }, { "url": "https://people.redhat.com/~hkario/marvin/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://pkg.go.dev/vuln/GO-2023-2375", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45762.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45762.json index 284b659711c..a58ee0b9c6e 100644 --- a/CVE-2023/CVE-2023-457xx/CVE-2023-45762.json +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45762.json @@ -2,16 +2,40 @@ "id": "CVE-2023-45762", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-07T13:15:07.293", - "lastModified": "2023-12-07T16:09:27.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:53:04.993", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Michael Uno (miunosoft) Responsive Column Widgets.This issue affects Responsive Column Widgets: from n/a through 1.2.7.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de redireccionamiento de URL a un sitio que no es de confianza ('Open Redirect') en Michael Uno (miunosoft) Responsive Column Widgets. Este problema afecta a Responsive Column Widgets: desde n/a hasta 1.2.7." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:michaeluno:responsive_column_widgets:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.7", + "matchCriteriaId": "2B6F2C0B-59F7-4B01-91CF-B0119C7319A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/responsive-column-widgets/wordpress-responsive-column-widgets-plugin-1-2-7-open-redirection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46157.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46157.json index cc83c363f0a..cd677b4ed36 100644 --- a/CVE-2023/CVE-2023-461xx/CVE-2023-46157.json +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46157.json @@ -2,23 +2,87 @@ "id": "CVE-2023-46157", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-08T13:15:07.193", - "lastModified": "2023-12-08T14:23:10.393", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:13:08.513", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "File-Manager in MGT CloudPanel 2.0.0 through 2.3.2 allows the lowest privilege user to achieve OS command injection by changing file ownership and changing file permissions to 4755." + }, + { + "lang": "es", + "value": "File-Manager en MGT CloudPanel 2.0.0 a 2.3.2 permite al usuario con privilegios m\u00e1s bajos lograr la inyecci\u00f3n de comandos del sistema operativo cambiando la propiedad del archivo y cambiando los permisos del archivo a 4755." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mgt-commerce:cloudpanel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndIncluding": "2.3.2", + "matchCriteriaId": "77EC376D-BB32-4F66-B8B4-E3F1273276AC" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.cloudpanel.io/docs/v2/changelog/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.mgt-commerce.com/docs/mgt-cloudpanel/dashboard", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46214.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46214.json index ffe963c67cc..3078917f821 100644 --- a/CVE-2023/CVE-2023-462xx/CVE-2023-46214.json +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46214.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46214", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-11-16T21:15:08.630", - "lastModified": "2023-11-24T23:07:00.743", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-12T16:15:08.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46218.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46218.json index 5dd1d24d397..5648aecc390 100644 --- a/CVE-2023/CVE-2023-462xx/CVE-2023-46218.json +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46218.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46218", "sourceIdentifier": "support@hackerone.com", "published": "2023-12-07T01:15:07.160", - "lastModified": "2023-12-10T03:15:07.003", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T15:53:14.470", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,19 +14,102 @@ "value": "Esta falla permite que un servidor HTTP malicioso establezca \"supercookies\" en curl que luego se devuelven a m\u00e1s or\u00edgenes de los que est\u00e1n permitidos o son posibles. Esto permite que un sitio establezca cookies que luego se enviar\u00e1n a sitios y dominios diferentes y no relacionados. Podr\u00eda hacer esto explotando una falla de may\u00fasculas y min\u00fasculas en la funci\u00f3n de curl que verifica un dominio de cookie determinado con Public Suffix List (PSL). Por ejemplo, una cookie podr\u00eda configurarse con `domain=co.UK` cuando la URL utilizaba un nombre de host en min\u00fascula `curl.co.uk`, aunque `co.uk` aparezca como un dominio PSL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.46.0", + "versionEndIncluding": "8.4.0", + "matchCriteriaId": "CDCA27BA-B527-4B8F-91D5-CEE58282FD45" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + } + ], "references": [ { "url": "https://curl.se/docs/CVE-2023-46218.html", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://hackerone.com/reports/2212193", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ZX3VW67N4ACRAPMV2QS2LVYGD7H2MVE/", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46307.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46307.json index baa6e52d0fb..ede337d4d00 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46307.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46307.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46307", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T06:15:54.683", - "lastModified": "2023-12-07T12:12:27.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:06:02.260", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,23 +14,89 @@ "value": "Se descubri\u00f3 un problema en server.js en etcd-browser 87ae63d75260. Al proporcionar una entrada /../../../ Directory Traversal a la solicitud GET de la URL mientras se conecta al puerto del servidor remoto especificado durante la configuraci\u00f3n, un atacante puede recuperar archivos del sistema operativo local desde el sistema remoto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:buddho:etcd_browser:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CE6FF10-564C-460D-AF37-2B4C2DF43C7D" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Nov/11", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Nov/9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://hub.docker.com/r/buddho/etcd-browser", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://hub.docker.com/r/buddho/etcd-browser/tags", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46454.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46454.json new file mode 100644 index 00000000000..9f60fb24baa --- /dev/null +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46454.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-46454", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T15:15:07.680", + "lastModified": "2023-12-12T15:52:06.410", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In GL.iNET GL-AR300M routers with firmware v4.3.7, it is possible to inject arbitrary shell commands through a crafted package name in the package information functionality." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://cyberaz0r.info/2023/11/glinet-multiple-vulnerabilities/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46455.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46455.json new file mode 100644 index 00000000000..9eb7c985fdc --- /dev/null +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46455.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46455", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T15:15:07.743", + "lastModified": "2023-12-12T15:52:06.410", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In GL.iNET GL-AR300M routers with firmware v4.3.7 it is possible to write arbitrary files through a path traversal attack in the OpenVPN client file upload functionality." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://cyberaz0r.info/2023/11/glinet-multiple-vulnerabilities/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.gl-inet.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46456.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46456.json new file mode 100644 index 00000000000..7b551fcd63e --- /dev/null +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46456.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46456", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T15:15:07.810", + "lastModified": "2023-12-12T15:52:06.410", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In GL.iNET GL-AR300M routers with firmware 3.216 it is possible to inject arbitrary shell commands through the OpenVPN client file upload functionality." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://cyberaz0r.info/2023/11/glinet-multiple-vulnerabilities/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.gl-inet.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46641.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46641.json index e8ee929e9f4..a45dd5fa759 100644 --- a/CVE-2023/CVE-2023-466xx/CVE-2023-46641.json +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46641.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46641", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-07T11:15:08.007", - "lastModified": "2023-12-07T12:12:22.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:11:31.140", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code4recovery:12_step_meeting_list:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.14.25", + "matchCriteriaId": "F150AB3C-2F40-4C2A-8ABF-6602DC34A83A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/12-step-meeting-list/wordpress-12-step-meeting-list-plugin-3-14-24-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46857.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46857.json index 9ddd774d3f8..533774d1a8e 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46857.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46857.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46857", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T06:15:54.740", - "lastModified": "2023-12-07T12:12:27.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:05:02.030", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,19 +14,81 @@ "value": "Squidex anterior a 7.9.0 permite XSS a trav\u00e9s de un documento SVG en la funci\u00f3n Cargar activos. Esto ocurre porque hay una lista negra incompleta en la inspecci\u00f3n SVG, lo que permite JavaScript en el atributo SRC de un elemento IFRAME. Se requiere un ataque autenticado con permiso assets.create para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:squidex.io:squidex:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.9.0", + "matchCriteriaId": "90B9B378-EEF4-47AD-8833-B2E33F566A76" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2023/11/08/4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://census-labs.com/news/2023/11/08/weak-svg-asset-filtering-mechanism-in-squidex-cms/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://support.squidex.io/c/news/9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46916.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46916.json index 62cb18bd88b..2939567b987 100644 --- a/CVE-2023/CVE-2023-469xx/CVE-2023-46916.json +++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46916.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46916", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T06:15:54.803", - "lastModified": "2023-12-07T12:12:27.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:03:51.163", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,87 @@ "value": "Los dispositivos Maxima Max Pro Power 1.0 486A permiten la reproducci\u00f3n del tr\u00e1fico BLE. Un atacante puede utilizar el identificador de caracter\u00edstica GATT 0x0012 para realizar acciones potencialmente disruptivas, como iniciar un monitor de frecuencia card\u00edaca." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:maximawatches:maxima_max_pro_power_firmware:1.0_486a:*:*:*:*:*:*:*", + "matchCriteriaId": "715096FF-8DF3-4877-B4AE-073FA4F0D86A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:maximawatches:maxima_max_pro_power:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93F050F9-344A-4F7D-84D7-7964DF1886EF" + } + ] + } + ] + } + ], "references": [ { "url": "http://packetstormsecurity.com/files/175660", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.maximawatches.com/products/max-pro-power", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-474xx/CVE-2023-47440.json b/CVE-2023/CVE-2023-474xx/CVE-2023-47440.json index 3fde3884892..011f763e64d 100644 --- a/CVE-2023/CVE-2023-474xx/CVE-2023-47440.json +++ b/CVE-2023/CVE-2023-474xx/CVE-2023-47440.json @@ -2,27 +2,93 @@ "id": "CVE-2023-47440", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T18:15:08.080", - "lastModified": "2023-12-07T18:30:52.097", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T18:06:36.190", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Gladys Assistant v4.27.0 and prior is vulnerable to Directory Traversal. The patch of CVE-2023-43256 was found to be incomplete, allowing authenticated attackers to extract sensitive files in the host machine." + }, + { + "lang": "es", + "value": "Gladys Assistant v4.27.0 y anteriores son vulnerables a Directory Traversal. Se descubri\u00f3 que el parche CVE-2023-43256 estaba incompleto, lo que permit\u00eda a atacantes autenticados extraer archivos confidenciales en la m\u00e1quina host." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gladysassistant:gladys_assistant:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.30.0", + "matchCriteriaId": "A084D786-016A-4500-B235-6E6E70C2D241" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://blog.moku.fr/cve/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://blog.moku.fr/cves/CVE-2023-47440/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/GladysAssistant/Gladys/pull/1918/commits/4f56ba250ff9f46578f1afa6a97e62e74bad83b7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47779.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47779.json index 3f7aa515eb1..124ec26ce13 100644 --- a/CVE-2023/CVE-2023-477xx/CVE-2023-47779.json +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47779.json @@ -2,16 +2,40 @@ "id": "CVE-2023-47779", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-07T12:15:07.820", - "lastModified": "2023-12-07T16:09:27.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:53:31.067", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks. Integration for Constant Contact and Contact Form 7, WPForms, Elementor, Ninja Forms.This issue affects Integration for Constant Contact and Contact Form 7, WPForms, Elementor, Ninja Forms: from n/a through 1.1.4.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de redirecci\u00f3n de URL a un sitio que no es de confianza (\"Open Redirect\") en CRM Perks. Integraci\u00f3n para Constant Contact y Contact Form 7, WPForms, Elementor, Ninja Forms. Este problema afecta la integraci\u00f3n para Constant Contact y Contact Form 7, WPForms, Elementor, Ninja Forms: desde n/a hasta 1.1.4." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:crmperks:integration_for_constant_contact_and_contact_form_7\\,_wpforms\\,_elementor\\,_ninja:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.5", + "matchCriteriaId": "B8D9AA4A-1BCE-4E17-A7E0-1183AC913AF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/cf7-constant-contact/wordpress-integration-for-contact-form-7-and-constant-contact-plugin-1-1-4-open-redirection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-481xx/CVE-2023-48123.json b/CVE-2023/CVE-2023-481xx/CVE-2023-48123.json index d3b74e83057..00b58df7be6 100644 --- a/CVE-2023/CVE-2023-481xx/CVE-2023-48123.json +++ b/CVE-2023/CVE-2023-481xx/CVE-2023-48123.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48123", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-06T20:15:07.240", - "lastModified": "2023-12-07T12:12:36.717", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:11:35.730", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,19 +14,88 @@ "value": "Un problema en Netgate pfSense Plus v.23.05.1 y anteriores y pfSense CE v.2.7.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud manipulada al archivo packet_capture.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netgate:pfsense:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.7.0", + "matchCriteriaId": "B58A09CC-355B-49BD-908B-ED3058794307" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netgate:pfsense_plus:*:*:*:*:*:*:*:*", + "versionEndIncluding": "23.05.1", + "matchCriteriaId": "D1309A70-521F-4F6C-8BE7-AE9460C039A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.netgate.com/downloads/pfSense-SA-23_11.webgui.asc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/pfsense/pfsense/commit/f72618c4abb61ea6346938d0c93df9078736b775", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://redmine.pfsense.org/issues/14809", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48227.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48227.json new file mode 100644 index 00000000000..5f3ce453f7a --- /dev/null +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48227.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-48227", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-12-12T17:15:08.143", + "lastModified": "2023-12-12T17:22:30.567", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Umbraco is an ASP.NET content management system (CMS). Starting in version 8.0.0 and prior to versions 8.18.10, 10.7.0, and 12.3.0, Backoffice users with send for approval permission but not publish permission are able to publish in some scenarios. Versions 8.18.10, 10.7.0, and 12.3.0 contains a patch for this issue. No known workarounds are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-335x-5wcm-8jv2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48313.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48313.json new file mode 100644 index 00000000000..fbe5e70c5a8 --- /dev/null +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48313.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-48313", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-12-12T18:15:22.933", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Umbraco is an ASP.NET content management system (CMS). Starting in 10.0.0 and prior to versions 10.8.1 and 12.3.4, Umbraco contains a cross-site scripting (XSS) vulnerability enabling attackers to bring malicious content into a website or application. Versions 10.8.1 and 12.3.4 contain a patch for this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-v98m-398x-269r", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48325.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48325.json index 8ee38af71ae..80a5bcc7dd8 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48325.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48325.json @@ -2,16 +2,40 @@ "id": "CVE-2023-48325", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-07T12:15:08.020", - "lastModified": "2023-12-07T16:09:27.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:53:19.390", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in PluginOps Landing Page Builder \u2013 Lead Page \u2013 Optin Page \u2013 Squeeze Page \u2013 WordPress Landing Pages.This issue affects Landing Page Builder \u2013 Lead Page \u2013 Optin Page \u2013 Squeeze Page \u2013 WordPress Landing Pages: from n/a through 1.5.1.5.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de redirecci\u00f3n de URL a un sitio que no es de confianza ('Open Redirect') en PluginOps Landing Page Builder \u2013 Lead Page \u2013 Optin Page \u2013 Squeeze Page \u2013 WordPress Landing Pages. Este problema afecta a anding Page Builder \u2013 Lead Page \u2013 Optin Page \u2013 Squeeze Page \u2013 WordPress Landing Pages: desde n/a hasta 1.5.1.5." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluginops:landing_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.5.1.6", + "matchCriteriaId": "2BDF2EFA-E566-412A-BD31-AFC6A730BFEC" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/page-builder-add/wordpress-landing-page-builder-plugin-1-5-1-5-open-redirection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-488xx/CVE-2023-48859.json b/CVE-2023/CVE-2023-488xx/CVE-2023-48859.json index 82fd3ad47b6..3ff9a8ce4c8 100644 --- a/CVE-2023/CVE-2023-488xx/CVE-2023-48859.json +++ b/CVE-2023/CVE-2023-488xx/CVE-2023-48859.json @@ -2,19 +2,91 @@ "id": "CVE-2023-48859", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-06T15:15:06.967", - "lastModified": "2023-12-06T18:49:19.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:47:30.293", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "TOTOLINK A3002RU version 2.0.0-B20190902.1958 has a post-authentication RCE due to incorrect access control, allows attackers to bypass front-end security restrictions and execute arbitrary code." + }, + { + "lang": "es", + "value": "TOTOLINK A3002RU versi\u00f3n 2.0.0-B20190902.1958 tiene un RCE de autenticaci\u00f3n posterior debido a un control de acceso incorrecto, permite a los atacantes eludir las restricciones de seguridad del front-end y ejecutar c\u00f3digo arbitrario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a3002ru_firmware:2.0.0-b20190902.1958:*:*:*:*:*:*:*", + "matchCriteriaId": "3FF7809B-C61E-457D-8065-D91A55861D9A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21945D3C-27AA-4614-8D5D-C22DE8C56F94" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/xieqiang11/security_research/blob/main/TOTOLINK-A3002RU-RCE.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-488xx/CVE-2023-48860.json b/CVE-2023/CVE-2023-488xx/CVE-2023-48860.json index dfa6e957d6f..b93f74644f1 100644 --- a/CVE-2023/CVE-2023-488xx/CVE-2023-48860.json +++ b/CVE-2023/CVE-2023-488xx/CVE-2023-48860.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48860", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T08:15:07.213", - "lastModified": "2023-12-07T12:12:22.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:02:54.853", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,79 @@ "value": "TOTOLINK N300RT versi\u00f3n 3.2.4-B20180730.0906 tiene un RCE de autenticaci\u00f3n posterior debido a un control de acceso incorrecto, lo que permite a los atacantes eludir las restricciones de seguridad del front-end y ejecutar c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:n300rt_firmware:3.2.4-b20180730.0906:*:*:*:*:*:*:*", + "matchCriteriaId": "013A464E-33B9-4BA5-838D-92DE2897E951" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:n300rt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0581174-E6B1-4E3D-8384-7852EC53FC14" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/xieqiang11/security_research/blob/main/TOTOLINK-N300RT-RCE.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-489xx/CVE-2023-48928.json b/CVE-2023/CVE-2023-489xx/CVE-2023-48928.json index 9c342e6d534..97f72fee982 100644 --- a/CVE-2023/CVE-2023-489xx/CVE-2023-48928.json +++ b/CVE-2023/CVE-2023-489xx/CVE-2023-48928.json @@ -2,19 +2,79 @@ "id": "CVE-2023-48928", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-08T05:15:08.807", - "lastModified": "2023-12-08T14:23:10.393", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:12:37.883", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Franklin Fueling Systems System Sentinel AnyWare (SSA) version 1.6.24.492 is vulnerable to Open Redirect. The 'path' parameter of the prefs.asp resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL." + }, + { + "lang": "es", + "value": "Franklin Fueling Systems System Sentinel AnyWare (SSA) versi\u00f3n 1.6.24.492 es vulnerable a Open Redirect. El par\u00e1metro 'ruta' del recurso prefs.asp permite a un atacante redirigir a un usuario v\u00edctima a un sitio web arbitrario utilizando una URL manipulada." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:franklin-electric:system_sentinel_anyware:1.6.24.492:*:*:*:*:*:*:*", + "matchCriteriaId": "8BC15A75-BF6D-4F6D-A6E5-65B49968BA77" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/MatJosephs/CVEs/tree/main/CVE-2023-48928", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-489xx/CVE-2023-48929.json b/CVE-2023/CVE-2023-489xx/CVE-2023-48929.json index 5f66e1a8cda..f21c398dbc6 100644 --- a/CVE-2023/CVE-2023-489xx/CVE-2023-48929.json +++ b/CVE-2023/CVE-2023-489xx/CVE-2023-48929.json @@ -2,19 +2,79 @@ "id": "CVE-2023-48929", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-08T05:15:08.897", - "lastModified": "2023-12-08T14:23:10.393", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:12:58.153", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Franklin Fueling Systems System Sentinel AnyWare (SSA) version 1.6.24.492 is vulnerable to Session Fixation. The 'sid' parameter in the group_status.asp resource allows an attacker to escalate privileges and obtain sensitive information." + }, + { + "lang": "es", + "value": "Franklin Fueling Systems System Sentinel AnyWare (SSA) versi\u00f3n 1.6.24.492 es vulnerable a la correcci\u00f3n de sesiones. El par\u00e1metro 'sid' en el recurso group_status.asp permite a un atacante escalar privilegios y obtener informaci\u00f3n confidencial." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:franklin-electric:system_sentinel_anyware:1.6.24.492:*:*:*:*:*:*:*", + "matchCriteriaId": "8BC15A75-BF6D-4F6D-A6E5-65B49968BA77" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/MatJosephs/CVEs/tree/main/CVE-2023-48929", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-490xx/CVE-2023-49007.json b/CVE-2023/CVE-2023-490xx/CVE-2023-49007.json index 22f7515eed2..ad79b96a4aa 100644 --- a/CVE-2023/CVE-2023-490xx/CVE-2023-49007.json +++ b/CVE-2023/CVE-2023-490xx/CVE-2023-49007.json @@ -2,19 +2,92 @@ "id": "CVE-2023-49007", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-08T14:15:07.153", - "lastModified": "2023-12-08T14:23:10.393", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:13:30.867", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Netgear Orbi RBR750 firmware before V7.2.6.21, there is a stack-based buffer overflow in /usr/sbin/httpd." + }, + { + "lang": "es", + "value": "En el firmware Netgear Orbi RBR750 anterior a V7.2.6.21, hay un desbordamiento del b\u00fafer basado en pila en /usr/sbin/httpd." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2.6.21", + "matchCriteriaId": "0DB9D702-FD85-4DF2-8CC6-8C3291FD0ABE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C13F5C69-FA9B-472A-9036-0C2967BDCDE9" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/5erua/netgear_orbi_overflow_vulnerability/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-490xx/CVE-2023-49096.json b/CVE-2023/CVE-2023-490xx/CVE-2023-49096.json index b99f8a32931..520bc206b06 100644 --- a/CVE-2023/CVE-2023-490xx/CVE-2023-49096.json +++ b/CVE-2023/CVE-2023-490xx/CVE-2023-49096.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49096", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-06T20:15:07.287", - "lastModified": "2023-12-07T12:12:36.717", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:09:48.753", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -50,30 +70,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.8.13", + "matchCriteriaId": "93D6F598-55D9-4041-BED8-4448226B5EFF" + } + ] + } + ] + } + ], "references": [ { "url": "https://cwe.mitre.org/data/definitions/88.html", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://en.wikipedia.org/wiki/Pass_the_hash", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://ffmpeg.org/ffmpeg-filters.html#drawtext-1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/jellyfin/jellyfin/commit/a656799dc879d16d21bf2ce7ad412ebd5d45394a", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/jellyfin/jellyfin/issues/5415", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://github.com/jellyfin/jellyfin/security/advisories/GHSA-866x-wj5j-2vf4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49225.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49225.json index cd375af50ee..33a6ca7e5d9 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49225.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49225.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49225", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-12-07T07:15:12.880", - "lastModified": "2023-12-07T12:12:22.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:04:37.617", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,1123 @@ "value": "Existe una vulnerabilidad de Cross-Site-Scripting en los productos Ruckus Access Point (ZoneDirector, SmartZone y AP Solo). Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en el navegador web del usuario que inicia sesi\u00f3n en el producto. En cuanto a los productos/modelos/versiones afectados, consulte la informaci\u00f3n proporcionada por el proveedor que figura en la secci\u00f3n [Referencias] o la lista en la secci\u00f3n [Estado del producto]." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:r750_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "19637FB4-A1EC-4DDB-9FD2-B176427B9933" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA49CB45-1196-4AD7-8AB6-C5593BBF015F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:r650_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "2F805AE7-830E-4D88-AA80-40FEC783AC84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:r650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "951BDA12-0294-472A-9292-F60AC6D4292B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:r730_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "4F98CC2D-247B-493F-A1DD-8133622C2AE7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:r730:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB28A5E0-6F42-4133-B1D3-1D0116079094" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:t750_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "DFCDC4FB-7448-4E19-AF4D-897180F3775B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:t750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C15AA25-82B2-4C02-8361-E8F6179B525A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:r510_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "5D6269F0-AFA6-48A9-92D2-3A3250B1E6C0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:e510_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "2D2FB77C-1E97-44C5-A961-7F91B1A8AB34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FBF5C92C-C889-4732-BB00-E6D55613E410" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:c110_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "6531A85F-9AA8-4A26-9A81-09003B8AAF2E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A77671DB-6197-4C8D-B667-A0081350E5AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:r320_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "7C00DA68-6EA2-4D88-B60C-6980D4953912" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93CE3224-85D2-4039-8F24-BB503DFD42C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:h510_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "843E61F5-DE53-47B3-BF24-B817BE9F334E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:h320_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "F625B309-F3BC-4899-B6B4-C460B7502730" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:t305_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "2ED5CB06-9A07-4EF6-B730-7D24B8E131F7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:t305:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0500E6E8-D56C-41EC-B9C5-72C5DD955639" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:m510_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "3EB3F18F-04F1-4D37-A74C-B12ED64ECDEE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4AE7200-4090-4B81-A22F-B8553A014D21" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:r720_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "73590841-C0E4-423B-89F3-C5E3E5DC3A84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:r710_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "CD213C0E-8D62-43C1-AAAD-72AB2455F4C8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:t710_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "1AC75B29-992F-4917-B0A9-6B4C16905E3A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A40B9489-D999-4355-953E-36A7F8DEF299" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:t610_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "0273FF13-6329-4A68-B2B1-674D0FDCEACC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:r610_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "7CA61CD3-AFD8-4C9B-B707-850A352EFF63" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4244947C-538E-4B83-B4F4-3DD4F3C22E83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:t310d_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "3D3D9629-CDD0-497E-A798-BD68696D7B0A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D3E8C6-4676-4B74-A252-132A26670C64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:t310s_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "47656F30-691A-4072-B5DF-0B4026133B24" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72378D4B-ADB5-4DE5-BB92-1778BDFD61FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:t310n_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "8508F154-5538-401A-8A1E-192C38A482B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2ED4C9B4-7F70-4059-8592-FD3F034160C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:t310c_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "D50969FD-837B-49B3-820E-E02CA9CD75E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:t710s_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "11907B93-2CC9-43E7-98E9-B13370225009" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CFF0772-D853-4781-B326-E3BDEAC78EE0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:t610s_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.6565", + "matchCriteriaId": "A6B8C9F8-76A1-4B8C-8FB9-770CB0E7DC94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:t610s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "752CBB38-F5C6-4666-B062-B5E3B15CA1A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:r550_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.5585", + "matchCriteriaId": "260442D7-362E-4141-BE55-066154A5B587" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:r550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "215024F9-C68E-4919-9FD5-215CF900A830" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:r850_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.5585", + "matchCriteriaId": "392561BB-1413-44A3-B4D1-CC4A57DC67F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:r850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A244DE5-A9B3-45BE-8AD1-154546F4F1F4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:t750se_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "114.0.0.0.5585", + "matchCriteriaId": "0F079E97-F62E-4919-A21B-1443146FEB14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:t750se:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E1DE3AD-CA13-44CE-ACF1-3DE2D6C691BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "110.0.0.0.2014", + "matchCriteriaId": "0F6AF187-4EC5-4F8A-9FB3-E1FD4F71FA4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:r310:*:*:*:*:*:*:*:*", + "matchCriteriaId": "93655935-481F-477B-A0C3-EFFFB822C9D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "118.1.0.0.1274", + "matchCriteriaId": "22D73A1E-302B-4494-B0CF-48D298A25916" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*", + "matchCriteriaId": "700D0FAA-0964-486A-932B-08CF1A328468" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "118.1.0.0.1274", + "matchCriteriaId": "22D73A1E-302B-4494-B0CF-48D298A25916" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*", + "matchCriteriaId": "700D0FAA-0964-486A-932B-08CF1A328468" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:r560_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "118.1.0.0.1908", + "matchCriteriaId": "1BEFF83F-4F8E-4BFE-B964-2F019A846EF0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:r560:*:*:*:*:*:*:*:*", + "matchCriteriaId": "75E00EC7-030F-4E90-8747-4AA87C2DA73D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:h550_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "116.0.0.0.1506", + "matchCriteriaId": "DFDDACE4-B572-4E7F-8D7C-333B3108D0F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:h550:*:*:*:*:*:*:*:*", + "matchCriteriaId": "843E2FCE-C3EC-406A-8ECB-BA5F51C2DCFF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:h350_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "116.0.0.0.3128", + "matchCriteriaId": "F1056C4F-1A29-474A-AD6F-6911F68ED36E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:h350:*:*:*:*:*:*:*:*", + "matchCriteriaId": "389825B3-BD3F-48F9-A6EB-238D1485E24D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:t350c_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "116.0.0.0.1543", + "matchCriteriaId": "561DDAE6-C5A0-4DA8-AC07-0EF7D06A8848" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:t350c:*:*:*:*:*:*:*:*", + "matchCriteriaId": "663BF055-A677-418A-8009-599D7BE04221" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:t350d_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "116.0.0.0.1543", + "matchCriteriaId": "C77FF583-1BAF-4042-A5F0-07DF1FC4C5E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:t350d:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4323CCB1-EE5E-498F-86F3-00CE6C75F10D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:t350se_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "116.0.0.0.3136", + "matchCriteriaId": "BCC95847-0984-466D-9227-5A44971260F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:t350se:*:*:*:*:*:*:*:*", + "matchCriteriaId": "60A48D4A-75D9-486B-896D-7BF11AD3ED6B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:r350_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "116.0.0.0.1655", + "matchCriteriaId": "004DED59-2353-40D5-997A-E021728E4F23" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:r350:*:*:*:*:*:*:*:*", + "matchCriteriaId": "34B3B5B6-3365-47B2-847E-004489533CDA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:smartzone_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.1.1", + "matchCriteriaId": "6E0D700D-F65B-49CC-BA09-41B22A6884C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:smartzone:-:*:*:*:*:*:*:*", + "matchCriteriaId": "488EBBAE-099D-4448-AAE6-823C448C4DD6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "10.5.1", + "matchCriteriaId": "E1DA133A-1251-4946-BC27-FECABFEA056A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruckuswireless:zonedirector:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC847897-E9C7-4247-BC22-E999847E1110" + } + ] + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN45891816/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.ruckuswireless.com/security_bulletins/323", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49243.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49243.json index ddc1665a8eb..e9f39bad1b6 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49243.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49243.json @@ -2,23 +2,130 @@ "id": "CVE-2023-49243", "sourceIdentifier": "psirt@huawei.com", "published": "2023-12-06T09:15:08.497", - "lastModified": "2023-12-06T13:50:00.573", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:07:03.270", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Vulnerability of unauthorized access to email attachments in the email module. Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de acceso no autorizado a archivos adjuntos de correo electr\u00f3nico en el m\u00f3dulo de correo electr\u00f3nico. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "511F8CE2-C2B6-4A08-B992-49D9B75B8655" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49244.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49244.json index 4895bda270f..45aa3bc8931 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49244.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49244.json @@ -2,23 +2,115 @@ "id": "CVE-2023-49244", "sourceIdentifier": "psirt@huawei.com", "published": "2023-12-06T09:15:08.543", - "lastModified": "2023-12-06T13:50:00.573", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T15:42:53.687", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Permission management vulnerability in the multi-user module. Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de gesti\u00f3n de permisos en el m\u00f3dulo multiusuario. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49245.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49245.json index e4ed2ff7c11..f2c0ffd2d73 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49245.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49245.json @@ -2,23 +2,130 @@ "id": "CVE-2023-49245", "sourceIdentifier": "psirt@huawei.com", "published": "2023-12-06T09:15:08.590", - "lastModified": "2023-12-06T13:50:00.573", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:03:00.227", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Unauthorized access vulnerability in the Huawei Share module. Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de acceso no autorizado en el m\u00f3dulo Huawei Share. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "511F8CE2-C2B6-4A08-B992-49D9B75B8655" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49246.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49246.json index 77537c58468..8f99580ff09 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49246.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49246.json @@ -2,23 +2,125 @@ "id": "CVE-2023-49246", "sourceIdentifier": "psirt@huawei.com", "published": "2023-12-06T09:15:08.633", - "lastModified": "2023-12-06T13:50:00.573", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:04:15.010", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de acceso no autorizado en el m\u00f3dulo de gesti\u00f3n de tarjetas. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "511F8CE2-C2B6-4A08-B992-49D9B75B8655" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49247.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49247.json index d6cc33d60da..17efea0171d 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49247.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49247.json @@ -2,16 +2,53 @@ "id": "CVE-2023-49247", "sourceIdentifier": "psirt@huawei.com", "published": "2023-12-06T09:15:08.680", - "lastModified": "2023-12-06T13:50:00.573", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:19:24.277", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Permission verification vulnerability in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." + }, + { + "lang": "es", + "value": "Vulnerabilidad de verificaci\u00f3n de permisos en escenarios distribuidos. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + }, { "source": "psirt@huawei.com", "type": "Secondary", @@ -23,14 +60,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + } + ] + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49248.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49248.json index 3c23574425f..d68691122a7 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49248.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49248.json @@ -2,16 +2,53 @@ "id": "CVE-2023-49248", "sourceIdentifier": "psirt@huawei.com", "published": "2023-12-06T09:15:08.780", - "lastModified": "2023-12-06T13:50:00.573", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T15:29:11.907", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Vulnerability of unauthorized file access in the Settings app. Successful exploitation of this vulnerability may cause unauthorized file access." + }, + { + "lang": "es", + "value": "Vulnerabilidad de acceso no autorizado a archivos en la aplicaci\u00f3n Configuraci\u00f3n. La explotaci\u00f3n exitosa de esta vulnerabilidad puede causar acceso no autorizado a archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "psirt@huawei.com", "type": "Secondary", @@ -23,14 +60,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "511F8CE2-C2B6-4A08-B992-49D9B75B8655" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + } + ] + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-494xx/CVE-2023-49485.json b/CVE-2023/CVE-2023-494xx/CVE-2023-49485.json index 37609d3c3fa..362b0946474 100644 --- a/CVE-2023/CVE-2023-494xx/CVE-2023-49485.json +++ b/CVE-2023/CVE-2023-494xx/CVE-2023-49485.json @@ -2,19 +2,78 @@ "id": "CVE-2023-49485", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-08T15:15:07.893", - "lastModified": "2023-12-08T16:37:45.763", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:19:56.587", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "JFinalCMS v5.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the column management department." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que JFinalCMS v5.0.0 conten\u00eda una vulnerabilidad de Cross-Site Scripting (XSS) en el departamento de administraci\u00f3n de columnas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jfinalcms_project:jfinalcms:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0813B8F4-66B1-42C6-83A7-831B13233428" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Rabb1ter/cms/blob/main/There%20is%20a%20storage%20type%20XSS%20in%20the%20column%20management%20department.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-494xx/CVE-2023-49486.json b/CVE-2023/CVE-2023-494xx/CVE-2023-49486.json index 6a7e749314f..c1bf6afb8de 100644 --- a/CVE-2023/CVE-2023-494xx/CVE-2023-49486.json +++ b/CVE-2023/CVE-2023-494xx/CVE-2023-49486.json @@ -2,19 +2,78 @@ "id": "CVE-2023-49486", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-08T15:15:07.943", - "lastModified": "2023-12-08T16:37:45.763", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:19:42.290", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "JFinalCMS v5.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the model management department." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que JFinalCMS v5.0.0 conten\u00eda una vulnerabilidad de Cross-Site Scripting (XSS) en el departamento de gesti\u00f3n de modelos." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jfinalcms_project:jfinalcms:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0813B8F4-66B1-42C6-83A7-831B13233428" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Rabb1ter/cms/blob/main/There%20is%20a%20stored%20XSS%20in%20the%20model%20management%20department.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-494xx/CVE-2023-49487.json b/CVE-2023/CVE-2023-494xx/CVE-2023-49487.json index 158ccbd18ba..98ebbf4385b 100644 --- a/CVE-2023/CVE-2023-494xx/CVE-2023-49487.json +++ b/CVE-2023/CVE-2023-494xx/CVE-2023-49487.json @@ -2,19 +2,78 @@ "id": "CVE-2023-49487", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-08T15:15:07.990", - "lastModified": "2023-12-08T16:37:45.763", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:19:08.283", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "JFinalCMS v5.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the navigation management department." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que JFinalCMS v5.0.0 conten\u00eda una vulnerabilidad de Cross-Site Scripting (XSS) en el departamento de gesti\u00f3n de navegaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jfinalcms_project:jfinalcms:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0813B8F4-66B1-42C6-83A7-831B13233428" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Rabb1ter/cms/blob/main/There%20is%20a%20stored%20XSS%20in%20the%20navigation%20management%20office.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-494xx/CVE-2023-49492.json b/CVE-2023/CVE-2023-494xx/CVE-2023-49492.json index 4c681eb27ec..64f61f35e39 100644 --- a/CVE-2023/CVE-2023-494xx/CVE-2023-49492.json +++ b/CVE-2023/CVE-2023-494xx/CVE-2023-49492.json @@ -2,19 +2,80 @@ "id": "CVE-2023-49492", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T16:15:07.587", - "lastModified": "2023-12-07T17:36:41.553", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T18:21:17.307", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "DedeCMS v5.7.111 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the imgstick parameter at selectimages.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que DedeCMS v5.7.111 contiene una vulnerabilidad Cross-Site Scripting (XSS) Reflectante a trav\u00e9s del par\u00e1metro imgstick en selectimages.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7.111:*:*:*:*:*:*:*", + "matchCriteriaId": "377F392A-A04B-4E7A-BBE8-F77CE65BDFCF" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Hebing123/cve/issues/2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-494xx/CVE-2023-49493.json b/CVE-2023/CVE-2023-494xx/CVE-2023-49493.json index 0fc42f66f1f..770584022e9 100644 --- a/CVE-2023/CVE-2023-494xx/CVE-2023-49493.json +++ b/CVE-2023/CVE-2023-494xx/CVE-2023-49493.json @@ -2,19 +2,80 @@ "id": "CVE-2023-49493", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-07T16:15:07.633", - "lastModified": "2023-12-07T17:36:41.553", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T18:23:26.673", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "DedeCMS v5.7.111 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the v parameter at selectimages.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que DedeCMS v5.7.111 contiene una vulnerabilidad de Cross-Site Scripting (XSS) Reflectante a trav\u00e9s del par\u00e1metro v en selectimages.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7.111:*:*:*:*:*:*:*", + "matchCriteriaId": "377F392A-A04B-4E7A-BBE8-F77CE65BDFCF" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Hebing123/cve/issues/2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49746.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49746.json index a24d24a7ca7..66b1fd82290 100644 --- a/CVE-2023/CVE-2023-497xx/CVE-2023-49746.json +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49746.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49746", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-07T11:15:08.200", - "lastModified": "2023-12-07T12:12:22.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:56:40.860", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -50,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:softaculous:speedycache:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.3", + "matchCriteriaId": "8B9674E6-A715-408F-B3A9-644B2117EDF5" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/speedycache/wordpress-speedycache-plugin-1-1-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49923.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49923.json new file mode 100644 index 00000000000..f6a6f752a35 --- /dev/null +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49923.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-49923", + "sourceIdentifier": "bressers@elastic.co", + "published": "2023-12-12T18:15:23.153", + "lastModified": "2023-12-12T18:58:37.987", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": " An issue was discovered by Elastic whereby the Documents API of App Search logged the raw contents of indexed documents at INFO log level. Depending on the contents of such documents, this could lead to the insertion of sensitive or private information in the App Search logs. Elastic has released 8.11.2 and 7.17.16 that resolves this issue by changing the log level at which these are logged to DEBUG, which is disabled by default." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://discuss.elastic.co/t/enterprise-search-8-11-2-7-17-16-security-update-esa-2023-31/349181", + "source": "bressers@elastic.co" + }, + { + "url": "https://www.elastic.co/community/security", + "source": "bressers@elastic.co" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49990.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49990.json index 72350fff9e6..179869cbe5d 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49990.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49990.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49990", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T14:15:07.553", - "lastModified": "2023-12-12T14:15:07.553", - "vulnStatus": "Received", + "lastModified": "2023-12-12T15:52:06.410", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49991.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49991.json index 682f5cc4c96..b3c08d2ead9 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49991.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49991.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49991", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T14:15:07.600", - "lastModified": "2023-12-12T14:15:07.600", - "vulnStatus": "Received", + "lastModified": "2023-12-12T15:52:06.410", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49992.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49992.json index 81023136be1..d8fc1a9e3f4 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49992.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49992.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49992", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T14:15:07.653", - "lastModified": "2023-12-12T14:15:07.653", - "vulnStatus": "Received", + "lastModified": "2023-12-12T15:52:06.410", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49993.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49993.json index a370d59f92d..99bad34a585 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49993.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49993.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49993", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T14:15:07.700", - "lastModified": "2023-12-12T14:15:07.700", - "vulnStatus": "Received", + "lastModified": "2023-12-12T15:52:06.410", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49994.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49994.json index aff86710653..9fe14491db1 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49994.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49994.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49994", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T14:15:07.750", - "lastModified": "2023-12-12T14:15:07.750", - "vulnStatus": "Received", + "lastModified": "2023-12-12T15:52:06.410", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50164.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50164.json index c6223dd6b43..8cc7c7f1c5b 100644 --- a/CVE-2023/CVE-2023-501xx/CVE-2023-50164.json +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50164.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50164", "sourceIdentifier": "security@apache.org", "published": "2023-12-07T09:15:07.060", - "lastModified": "2023-12-07T21:15:08.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:01:42.177", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,7 +14,30 @@ "value": "Un atacante puede manipular los par\u00e1metros de carga de archivos para permitir path traversal y, en algunas circunstancias, esto puede provocar la carga de un archivo malicioso que puede usarse para realizar la ejecuci\u00f3n remota de c\u00f3digo. Se recomienda a los usuarios actualizar a las versiones Struts 2.5.33 o Struts 6.3.0.1 o superior para solucionar este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -27,14 +50,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.5.33", + "matchCriteriaId": "BE174994-63BE-4A3F-A986-7903868FCE23" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndExcluding": "6.3.0.2", + "matchCriteriaId": "DBE0443B-320B-4C29-83DC-624546AEE6D5" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2023/12/07/1", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50495.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50495.json new file mode 100644 index 00000000000..eec4a8d7b8a --- /dev/null +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50495.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-50495", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-12T15:15:07.867", + "lastModified": "2023-12-12T15:52:06.410", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry()." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html", + "source": "cve@mitre.org" + }, + { + "url": "https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5557.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5557.json index 01c20390493..67543e0ccfd 100644 --- a/CVE-2023/CVE-2023-55xx/CVE-2023-5557.json +++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5557.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5557", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-13T02:15:11.077", - "lastModified": "2023-12-12T10:15:11.207", + "lastModified": "2023-12-12T16:15:08.150", "vulnStatus": "Modified", "descriptions": [ { @@ -152,6 +152,22 @@ "url": "https://access.redhat.com/errata/RHSA-2023:7730", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2023:7731", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2023:7732", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2023:7733", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2023:7739", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-5557", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5761.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5761.json index fa89e7ae1d1..737393d49ae 100644 --- a/CVE-2023/CVE-2023-57xx/CVE-2023-5761.json +++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5761.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5761", "sourceIdentifier": "security@wordfence.com", "published": "2023-12-07T02:15:07.450", - "lastModified": "2023-12-07T12:12:36.717", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T15:50:05.353", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -38,14 +58,58 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:burst-statistics:burst_statistics:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "1.4.0", + "versionEndExcluding": "1.5.0", + "matchCriteriaId": "40FF62C0-CD72-40A7-AFFB-94788EFEFDED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:burst-statistics:burst_statistics:*:*:*:*:pro:wordpress:*:*", + "versionStartIncluding": "1.4.0", + "versionEndExcluding": "1.5.1", + "matchCriteriaId": "8581ADCC-2358-4B2F-9598-1A5F8E1C074A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2976467%40burst-statistics&new=2976467%40burst-statistics&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/30f8419c-c7b9-4c68-a845-26c0308d76f3?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5808.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5808.json index 531aeafece7..27f963645ac 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5808.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5808.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5808", "sourceIdentifier": "security.vulnerabilities@hitachivantara.com", "published": "2023-12-05T00:15:09.840", - "lastModified": "2023-12-11T18:15:30.130", + "lastModified": "2023-12-12T17:15:08.400", "vulnStatus": "Modified", "descriptions": [ { @@ -112,7 +112,7 @@ ], "references": [ { - "url": "https://knowledge.hitachivantara.com/Security/System_Management_Unit_(SMU)_versions_prior_to_14.8.7825.01%2C_used_to_manage_Hitachi_Vantara_NAS_products_are_susceptible_to_unintended_information_disclosure_via_unprivileged_access_to_HNAS_configuration_backup_and_diagnostic_data", + "url": "https://knowledge.hitachivantara.com/Security/System_Management_Unit_(SMU)_versions_prior_to_14.8.7825.01%2C_used_to_manage_Hitachi_Vantara_NAS_products_are_susceptible_to_unintended_information_disclosure_via_unprivileged_access_to_HNAS_configuration_backup_and_diagnostic_data.", "source": "security.vulnerabilities@hitachivantara.com" } ] diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6146.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6146.json index dc0ee7dc306..d78dbccbfc2 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6146.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6146.json @@ -2,16 +2,40 @@ "id": "CVE-2023-6146", "sourceIdentifier": "bugreport@qualys.com", "published": "2023-12-08T15:15:08.037", - "lastModified": "2023-12-08T16:37:45.763", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:20:59.940", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "\nA Qualys web application was found to have a stored XSS vulnerability resulting from the absence of HTML encoding in the presentation of logging information to users. This vulnerability allowed a user with login access to the application to introduce XSS payload via browser details.\u00a0\n\n" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que una aplicaci\u00f3n web Qualys ten\u00eda una vulnerabilidad XSS almacenada resultante de la ausencia de codificaci\u00f3n HTML en la presentaci\u00f3n de la informaci\u00f3n de registro a los usuarios. Esta vulnerabilidad permiti\u00f3 a un usuario con acceso a la aplicaci\u00f3n introducir el payload XSS a trav\u00e9s de los detalles del navegador." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "bugreport@qualys.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "bugreport@qualys.com", "type": "Secondary", @@ -46,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qualys:private_cloud_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.24.0.0", + "matchCriteriaId": "8592CBEB-FE44-4413-BC06-182BC622C87C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qualys.com/security-advisories/", - "source": "bugreport@qualys.com" + "source": "bugreport@qualys.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6180.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6180.json index f10dbb29af9..a2f2c07fd38 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6180.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6180.json @@ -2,16 +2,40 @@ "id": "CVE-2023-6180", "sourceIdentifier": "cna@cloudflare.com", "published": "2023-12-05T15:15:08.703", - "lastModified": "2023-12-05T15:27:51.100", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T15:49:29.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The tokio-boring library in version 4.0.0 is affected by a memory leak issue that can lead to excessive resource consumption and potential DoS by resource exhaustion. The set_ex_data function used by the library did not deallocate memory used by pre-existing data in memory each time after completing a TLS connection causing the program to consume more resources with each new connection.\n" + }, + { + "lang": "es", + "value": "La librer\u00eda tokio-boring en la versi\u00f3n 4.0.0 se ve afectada por un problema de p\u00e9rdida de memoria que puede provocar un consumo excesivo de recursos y una posible DoS por agotamiento de los recursos. La funci\u00f3n set_ex_data utilizada por la librer\u00eda no desasign\u00f3 la memoria utilizada por los datos preexistentes en la memoria cada vez que se complet\u00f3 una conexi\u00f3n TLS, lo que provoc\u00f3 que el programa consumiera m\u00e1s recursos con cada nueva conexi\u00f3n." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cna@cloudflare.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + }, { "source": "cna@cloudflare.com", "type": "Secondary", @@ -50,10 +84,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cloudflare:boring:4.0.0:*:*:*:*:rust:*:*", + "matchCriteriaId": "FE7E647F-7BD0-4C49-BF61-E39D8B8B318D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/cloudflare/boring/security/advisories/GHSA-pjrj-h4fg-6gm4", - "source": "cna@cloudflare.com" + "source": "cna@cloudflare.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6193.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6193.json index 56151cdd643..09bd8bb79b7 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6193.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6193.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6193", "sourceIdentifier": "cna@cloudflare.com", "published": "2023-12-12T14:15:07.797", - "lastModified": "2023-12-12T14:15:07.797", - "vulnStatus": "Received", + "lastModified": "2023-12-12T15:52:06.410", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6273.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6273.json index 085fe60a28c..5194a24b532 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6273.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6273.json @@ -2,23 +2,120 @@ "id": "CVE-2023-6273", "sourceIdentifier": "psirt@huawei.com", "published": "2023-12-06T09:15:08.857", - "lastModified": "2023-12-06T13:50:00.573", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T18:36:55.433", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Permission management vulnerability in the module for disabling Sound Booster. Successful exploitation of this vulnerability may cause features to perform abnormally." + }, + { + "lang": "es", + "value": "Vulnerabilidad de gesti\u00f3n de permisos en el m\u00f3dulo para deshabilitar Sound Booster. La explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar que las funciones funcionen de manera anormal." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "511F8CE2-C2B6-4A08-B992-49D9B75B8655" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json index 137fe43591c..a15043f14c5 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json @@ -2,12 +2,12 @@ "id": "CVE-2023-6275", "sourceIdentifier": "cna@vuldb.com", "published": "2023-11-24T15:15:07.783", - "lastModified": "2023-12-04T15:10:22.267", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-12T18:15:23.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input \"> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246104. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input \"> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-246104. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6288.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6288.json index 93784eeec62..b292d8aab5c 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6288.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6288.json @@ -2,19 +2,91 @@ "id": "CVE-2023-6288", "sourceIdentifier": "security@devolutions.net", "published": "2023-12-06T14:15:07.677", - "lastModified": "2023-12-06T18:49:19.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:52:48.990", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Code injection in Remote Desktop Manager 2023.3.9.3 and earlier on macOS allows an attacker to execute code via the DYLIB_INSERT_LIBRARIES environment variable.\n\n\n\n\n\n\n\n\n\n" + }, + { + "lang": "es", + "value": "La inyecci\u00f3n de c\u00f3digo en Remote Desktop Manager 2023.3.9.3 y versiones anteriores en macOS permite a un atacante ejecutar c\u00f3digo a trav\u00e9s de la variable de entorno DYLIB_INSERT_LIBRARIES." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023.3.10.2", + "matchCriteriaId": "185C0BDD-A18F-4AA6-8137-5F554EF53929" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2023-0021/", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6393.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6393.json index fbd6b77c6bd..902dd676e57 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6393.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6393.json @@ -2,16 +2,40 @@ "id": "CVE-2023-6393", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-06T17:15:07.377", - "lastModified": "2023-12-06T18:49:19.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T16:26:59.963", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A flaw was found in the Quarkus Cache Runtime. When request processing utilizes a Uni cached using @CacheResult and the cached Uni reuses the initial \"completion\" context, the processing switches to the cached Uni instead of the request context. This is a problem if the cached Uni context contains sensitive information, and could allow a malicious user to benefit from a POST request returning the response that is meant for another user, gaining access to sensitive data." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en Quarkus Cache Runtime. Cuando el procesamiento de solicitudes utiliza una Uni almacenada en cach\u00e9 usando @CacheResult y la Uni almacenada en cach\u00e9 reutiliza el contexto de \"completion\" inicial, el procesamiento cambia a la Uni almacenada en cach\u00e9 en lugar del contexto de solicitud. Esto es un problema si el contexto Uni almacenado en cach\u00e9 contiene informaci\u00f3n confidencial y podr\u00eda permitir que un usuario malintencionado se beneficie de una solicitud POST que devuelva la respuesta destinada a otro usuario, obteniendo acceso a datos confidenciales." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -46,14 +80,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE29B9D6-63DC-4779-ACE8-4E51E6A0AF37" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-6393", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253113", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6448.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6448.json index 3c58246d541..b478e7e4417 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6448.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6448.json @@ -2,16 +2,44 @@ "id": "CVE-2023-6448", "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "published": "2023-12-05T18:15:12.643", - "lastModified": "2023-12-05T20:13:47.300", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T15:31:22.767", + "vulnStatus": "Analyzed", + "cisaExploitAdd": "2023-12-11", + "cisaActionDue": "2023-12-18", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Unitronics Vision PLC and HMI Insecure Default Password Vulnerability", "descriptions": [ { "lang": "en", "value": "Unitronics Vision Series PLCs and HMIs use default administrative passwords. An unauthenticated attacker with network access to a PLC or HMI can take administrative control of the system.\n" + }, + { + "lang": "es", + "value": "Los PLC y HMI de Unitronics Vision Series utilizan contrase\u00f1as administrativas predeterminadas. Un atacante no autenticado con acceso a la red de un PLC o HMI puede tomar el control administrativo del sistema." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "type": "Secondary", @@ -35,6 +63,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + }, { "source": "9119a7d8-5eab-497f-8521-727c672e3725", "type": "Secondary", @@ -46,10 +84,367 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unitronics:vision1210_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77C7A79D-4EFE-41C2-88E9-F9A1A65C4D6E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unitronics:vision1210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32D6EFD3-61C3-4C4D-8B17-16591255EAE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unitronics:vision1040_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "48A0D42D-7A8D-457F-A5CD-86B51893F692" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unitronics:vision1040:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C91F4803-BC61-491F-9561-ECF043253B04" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unitronics:vision700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB10EB4D-BDBE-47FF-9F10-60B5CB35D900" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unitronics:vision700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "38C892EC-1980-459E-9B1F-E9F0C703E758" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unitronics:vision570_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13F59B69-E4F7-44D5-8B98-953DCAE8DA4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unitronics:vision570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "017A743B-AB98-4931-B7D6-F1062529B947" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unitronics:vision560_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "277889A8-0A02-4623-ABB6-02EEBAD2C444" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unitronics:vision560:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E24B3A0-2FD9-4C13-9E89-F218B9CCED7C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unitronics:vision430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "426B5B56-9B45-4B35-AE11-5BFE105A442F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unitronics:vision430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A078DEE-DB79-4E33-BF48-849D6A26F0FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unitronics:vision350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BE0058F-1D67-4911-8851-5C1A2DD37028" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unitronics:vision350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "406D6FA9-4C05-4612-811E-A32E4516EBC1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unitronics:vision130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD5FEF72-265B-49A4-96F2-C92AEC8CA4D4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unitronics:vision130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49A6FC0D-8687-4563-9C38-5AF0DCC46926" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unitronics:vision230_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96B4A225-6384-4C80-B3F5-441095EB8D01" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unitronics:vision230:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C360B7F4-9FDB-4143-87A0-1006C7C3A39C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unitronics:vision280_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0DAF7F8-CAF7-4C94-BE4A-680FDA6A7700" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unitronics:vision280:-:*:*:*:*:*:*:*", + "matchCriteriaId": "519F0192-4F48-4954-BAE1-8DC74BC0C017" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unitronics:vision290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C25C3B0-0521-433C-B63A-39021BDCE9A1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unitronics:vision290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66A05131-B264-4858-A533-CBA5E229D40D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unitronics:vision530_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B9FC8CD-6413-42C6-9A36-B3BE5DB7F044" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unitronics:vision530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A2DAADD-AD0E-43C5-B3CB-2F5445235C4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unitronics:vision120_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B42157C-52B2-4CBA-8946-DF74517CE9CC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unitronics:vision120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF245A2D-9C93-41C2-AD88-8B2ABA026D5B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems", - "source": "9119a7d8-5eab-497f-8521-727c672e3725" + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6538.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6538.json index dc2679f3e41..93b5fa62a13 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6538.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6538.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6538", "sourceIdentifier": "security.vulnerabilities@hitachivantara.com", "published": "2023-12-11T18:15:30.250", - "lastModified": "2023-12-12T13:43:48.853", + "lastModified": "2023-12-12T17:15:08.493", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -52,7 +52,7 @@ ], "references": [ { - "url": "https://knowledge.hitachivantara.com/Security/System_Management_Unit_(SMU)_versions_prior_to_14.8.7825.01%2C_used_to_manage_Hitachi_Vantara_NAS_products_is_susceptible_to_unintended_information_disclosure_via_unprivileged_access_to_SMU_configuration_backup_data", + "url": "https://knowledge.hitachivantara.com/Security/System_Management_Unit_(SMU)_versions_prior_to_14.8.7825.01%2C_used_to_manage_Hitachi_Vantara_NAS_products_is_susceptible_to_unintended_information_disclosure_via_unprivileged_access_to_SMU_configuration_backup_data.", "source": "security.vulnerabilities@hitachivantara.com" } ] diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6566.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6566.json index 15e497badf9..29dae01098a 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6566.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6566.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6566", "sourceIdentifier": "security@huntr.dev", "published": "2023-12-07T00:15:07.120", - "lastModified": "2023-12-07T12:12:36.717", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T15:54:28.520", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -40,8 +62,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,14 +82,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.0.0", + "matchCriteriaId": "1CF90546-1596-44C3-8F49-77B4CDD14DFD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/microweber/microweber/commit/eee0c6771e152022a91089a547272c8a542bb74e", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/cf4b68b5-8d97-4d05-9cde-e76b1a414fd6", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6588.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6588.json index 958b8033cc8..0561be830cf 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6588.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6588.json @@ -2,19 +2,79 @@ "id": "CVE-2023-6588", "sourceIdentifier": "security@devolutions.net", "published": "2023-12-07T16:15:07.727", - "lastModified": "2023-12-07T17:36:41.553", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T18:50:19.453", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "\n\n\nOffline mode is always enabled, even if permission disallows it, in \nDevolutions Server data source in Devolutions Workspace 2023.3.2.0 and \nearlier. This allows an attacker with access to the Workspace \napplication to access credentials when offline.\n\n\n\n\n" + }, + { + "lang": "es", + "value": "El modo sin conexi\u00f3n siempre est\u00e1 habilitado, incluso si el permiso no lo permite, en la fuente de datos del servidor de Devolutions en Devolutions Workspace 2023.3.2.0 y versiones anteriores. Esto permite que un atacante con acceso a la aplicaci\u00f3n Workspace acceda a las credenciales cuando est\u00e9 desconectado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:workspace:*:*:*:*:-:*:*:*", + "versionEndIncluding": "2023.3.2.0", + "matchCriteriaId": "749703AF-A1F3-4405-8677-EF10330FEC7B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2023-0022/", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6593.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6593.json new file mode 100644 index 00000000000..650dec752fb --- /dev/null +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6593.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-6593", + "sourceIdentifier": "security@devolutions.net", + "published": "2023-12-12T15:15:07.920", + "lastModified": "2023-12-12T15:52:06.410", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "\n\nClient side permission bypass in Devolutions Remote Desktop Manager 2023.3.4.0 and earlier on iOS allows an attacker that has access to the application to execute entries in a SQL data source without restriction.\n\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://devolutions.net/security/advisories/DEVO-2023-0023/", + "source": "security@devolutions.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6599.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6599.json index 09289eaef2d..d1bd3b18c4a 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6599.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6599.json @@ -2,15 +2,41 @@ "id": "CVE-2023-6599", "sourceIdentifier": "security@huntr.dev", "published": "2023-12-08T00:15:08.113", - "lastModified": "2023-12-08T14:23:10.393", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:22:17.503", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Missing Standardized Error Handling Mechanism in GitHub repository microweber/microweber prior to 2.0." + }, + { + "lang": "es", + "value": "Falta un mecanismo de manejo de errores estandarizado en el repositorio de GitHub microweber/microweber anterior a 2.0." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -36,8 +62,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,14 +82,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.0.0", + "matchCriteriaId": "1CF90546-1596-44C3-8F49-77B4CDD14DFD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/microweber/microweber/commit/f7eb9e1c6e801346f07f3b0164a01ac5f2ca5cfd", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/6198785c-bf60-422e-9b80-68a6e658a10e", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6607.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6607.json index bf427826618..857923dcb0c 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6607.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6607.json @@ -2,16 +2,40 @@ "id": "CVE-2023-6607", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-08T14:15:07.203", - "lastModified": "2023-12-08T14:23:10.393", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-12T17:15:41.850", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Tongda OA 2017 up to 11.10 and classified as critical. Affected by this vulnerability is an unknown functionality of the file general/wiki/cp/manage/delete.php. The manipulation of the argument TERM_ID_STR leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247243. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Tongda OA 2017 hasta 11.10 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo general/wiki/cp/manage/delete.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento TERM_ID_STR conduce a la inyecci\u00f3n SQL. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-247243. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -71,18 +95,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:tongda_oa:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.10", + "matchCriteriaId": "C9499005-4C72-4FA6-99EB-749B5AF3F4BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:tongda_oa:2017:*:*:*:*:*:*:*", + "matchCriteriaId": "A77F4CAB-A2ED-4AFF-B9C7-03C69B14AE9D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/willchen0011/cve/blob/main/sql.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.247243", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.247243", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index c8940734721..73fedbd227f 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-12T15:05:09.825551+00:00 +2023-12-12T19:00:21.077491+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-12T14:55:06.163000+00:00 +2023-12-12T18:58:44.580000+00:00 ``` ### Last Data Feed Release @@ -29,69 +29,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -232849 +232907 ``` ### CVEs added in the last Commit -Recently added CVEs: `26` +Recently added CVEs: `58` -* [CVE-2020-12612](CVE-2020/CVE-2020-126xx/CVE-2020-12612.json) (`2023-12-12T14:15:07.327`) -* [CVE-2022-46141](CVE-2022/CVE-2022-461xx/CVE-2022-46141.json) (`2023-12-12T12:15:10.003`) -* [CVE-2022-47374](CVE-2022/CVE-2022-473xx/CVE-2022-47374.json) (`2023-12-12T12:15:10.563`) -* [CVE-2022-47375](CVE-2022/CVE-2022-473xx/CVE-2022-47375.json) (`2023-12-12T12:15:10.797`) -* [CVE-2023-6727](CVE-2023/CVE-2023-67xx/CVE-2023-6727.json) (`2023-12-12T11:15:07.140`) -* [CVE-2023-38380](CVE-2023/CVE-2023-383xx/CVE-2023-38380.json) (`2023-12-12T12:15:11.477`) -* [CVE-2023-46156](CVE-2023/CVE-2023-461xx/CVE-2023-46156.json) (`2023-12-12T12:15:13.417`) -* [CVE-2023-46281](CVE-2023/CVE-2023-462xx/CVE-2023-46281.json) (`2023-12-12T12:15:13.653`) -* [CVE-2023-46282](CVE-2023/CVE-2023-462xx/CVE-2023-46282.json) (`2023-12-12T12:15:13.870`) -* [CVE-2023-46283](CVE-2023/CVE-2023-462xx/CVE-2023-46283.json) (`2023-12-12T12:15:14.067`) -* [CVE-2023-46284](CVE-2023/CVE-2023-462xx/CVE-2023-46284.json) (`2023-12-12T12:15:14.273`) -* [CVE-2023-46285](CVE-2023/CVE-2023-462xx/CVE-2023-46285.json) (`2023-12-12T12:15:14.477`) -* [CVE-2023-48427](CVE-2023/CVE-2023-484xx/CVE-2023-48427.json) (`2023-12-12T12:15:14.677`) -* [CVE-2023-48428](CVE-2023/CVE-2023-484xx/CVE-2023-48428.json) (`2023-12-12T12:15:14.873`) -* [CVE-2023-48429](CVE-2023/CVE-2023-484xx/CVE-2023-48429.json) (`2023-12-12T12:15:15.083`) -* [CVE-2023-48430](CVE-2023/CVE-2023-484xx/CVE-2023-48430.json) (`2023-12-12T12:15:15.433`) -* [CVE-2023-48431](CVE-2023/CVE-2023-484xx/CVE-2023-48431.json) (`2023-12-12T12:15:15.777`) -* [CVE-2023-49691](CVE-2023/CVE-2023-496xx/CVE-2023-49691.json) (`2023-12-12T12:15:15.990`) -* [CVE-2023-49692](CVE-2023/CVE-2023-496xx/CVE-2023-49692.json) (`2023-12-12T12:15:16.203`) -* [CVE-2023-49990](CVE-2023/CVE-2023-499xx/CVE-2023-49990.json) (`2023-12-12T14:15:07.553`) -* [CVE-2023-49991](CVE-2023/CVE-2023-499xx/CVE-2023-49991.json) (`2023-12-12T14:15:07.600`) -* [CVE-2023-49992](CVE-2023/CVE-2023-499xx/CVE-2023-49992.json) (`2023-12-12T14:15:07.653`) -* [CVE-2023-49993](CVE-2023/CVE-2023-499xx/CVE-2023-49993.json) (`2023-12-12T14:15:07.700`) -* [CVE-2023-49994](CVE-2023/CVE-2023-499xx/CVE-2023-49994.json) (`2023-12-12T14:15:07.750`) -* [CVE-2023-6193](CVE-2023/CVE-2023-61xx/CVE-2023-6193.json) (`2023-12-12T14:15:07.797`) +* [CVE-2023-36012](CVE-2023/CVE-2023-360xx/CVE-2023-36012.json) (`2023-12-12T18:15:21.970`) +* [CVE-2023-36019](CVE-2023/CVE-2023-360xx/CVE-2023-36019.json) (`2023-12-12T18:15:22.157`) +* [CVE-2023-36020](CVE-2023/CVE-2023-360xx/CVE-2023-36020.json) (`2023-12-12T18:15:22.333`) +* [CVE-2023-36391](CVE-2023/CVE-2023-363xx/CVE-2023-36391.json) (`2023-12-12T18:15:22.510`) +* [CVE-2023-36696](CVE-2023/CVE-2023-366xx/CVE-2023-36696.json) (`2023-12-12T18:15:22.690`) +* [CVE-2023-43364](CVE-2023/CVE-2023-433xx/CVE-2023-43364.json) (`2023-12-12T18:15:22.887`) +* [CVE-2023-48313](CVE-2023/CVE-2023-483xx/CVE-2023-48313.json) (`2023-12-12T18:15:22.933`) +* [CVE-2023-49923](CVE-2023/CVE-2023-499xx/CVE-2023-49923.json) (`2023-12-12T18:15:23.153`) +* [CVE-2023-20275](CVE-2023/CVE-2023-202xx/CVE-2023-20275.json) (`2023-12-12T18:15:16.520`) +* [CVE-2023-21740](CVE-2023/CVE-2023-217xx/CVE-2023-21740.json) (`2023-12-12T18:15:16.720`) +* [CVE-2023-35619](CVE-2023/CVE-2023-356xx/CVE-2023-35619.json) (`2023-12-12T18:15:16.913`) +* [CVE-2023-35621](CVE-2023/CVE-2023-356xx/CVE-2023-35621.json) (`2023-12-12T18:15:17.090`) +* [CVE-2023-35622](CVE-2023/CVE-2023-356xx/CVE-2023-35622.json) (`2023-12-12T18:15:17.260`) +* [CVE-2023-35624](CVE-2023/CVE-2023-356xx/CVE-2023-35624.json) (`2023-12-12T18:15:17.440`) +* [CVE-2023-35625](CVE-2023/CVE-2023-356xx/CVE-2023-35625.json) (`2023-12-12T18:15:17.620`) +* [CVE-2023-35628](CVE-2023/CVE-2023-356xx/CVE-2023-35628.json) (`2023-12-12T18:15:17.807`) +* [CVE-2023-35629](CVE-2023/CVE-2023-356xx/CVE-2023-35629.json) (`2023-12-12T18:15:17.990`) +* [CVE-2023-35630](CVE-2023/CVE-2023-356xx/CVE-2023-35630.json) (`2023-12-12T18:15:18.183`) +* [CVE-2023-35631](CVE-2023/CVE-2023-356xx/CVE-2023-35631.json) (`2023-12-12T18:15:18.360`) +* [CVE-2023-35632](CVE-2023/CVE-2023-356xx/CVE-2023-35632.json) (`2023-12-12T18:15:18.547`) +* [CVE-2023-35633](CVE-2023/CVE-2023-356xx/CVE-2023-35633.json) (`2023-12-12T18:15:18.760`) +* [CVE-2023-35634](CVE-2023/CVE-2023-356xx/CVE-2023-35634.json) (`2023-12-12T18:15:18.937`) +* [CVE-2023-35635](CVE-2023/CVE-2023-356xx/CVE-2023-35635.json) (`2023-12-12T18:15:19.107`) +* [CVE-2023-35636](CVE-2023/CVE-2023-356xx/CVE-2023-35636.json) (`2023-12-12T18:15:19.277`) +* [CVE-2023-35638](CVE-2023/CVE-2023-356xx/CVE-2023-35638.json) (`2023-12-12T18:15:19.460`) ### CVEs modified in the last Commit -Recently modified CVEs: `148` +Recently modified CVEs: `90` -* [CVE-2023-45316](CVE-2023/CVE-2023-453xx/CVE-2023-45316.json) (`2023-12-12T13:43:48.853`) -* [CVE-2023-45847](CVE-2023/CVE-2023-458xx/CVE-2023-45847.json) (`2023-12-12T13:43:48.853`) -* [CVE-2023-46701](CVE-2023/CVE-2023-467xx/CVE-2023-46701.json) (`2023-12-12T13:43:48.853`) -* [CVE-2023-48677](CVE-2023/CVE-2023-486xx/CVE-2023-48677.json) (`2023-12-12T13:43:48.853`) -* [CVE-2023-49563](CVE-2023/CVE-2023-495xx/CVE-2023-49563.json) (`2023-12-12T13:43:48.853`) -* [CVE-2023-49607](CVE-2023/CVE-2023-496xx/CVE-2023-49607.json) (`2023-12-12T13:43:48.853`) -* [CVE-2023-49695](CVE-2023/CVE-2023-496xx/CVE-2023-49695.json) (`2023-12-12T13:43:48.853`) -* [CVE-2023-49809](CVE-2023/CVE-2023-498xx/CVE-2023-49809.json) (`2023-12-12T13:43:48.853`) -* [CVE-2023-49874](CVE-2023/CVE-2023-498xx/CVE-2023-49874.json) (`2023-12-12T13:43:48.853`) -* [CVE-2023-6547](CVE-2023/CVE-2023-65xx/CVE-2023-6547.json) (`2023-12-12T13:43:48.853`) -* [CVE-2023-41963](CVE-2023/CVE-2023-419xx/CVE-2023-41963.json) (`2023-12-12T13:43:48.853`) -* [CVE-2023-49140](CVE-2023/CVE-2023-491xx/CVE-2023-49140.json) (`2023-12-12T13:43:48.853`) -* [CVE-2023-49143](CVE-2023/CVE-2023-491xx/CVE-2023-49143.json) (`2023-12-12T13:43:48.853`) -* [CVE-2023-49713](CVE-2023/CVE-2023-497xx/CVE-2023-49713.json) (`2023-12-12T13:43:48.853`) -* [CVE-2023-4932](CVE-2023/CVE-2023-49xx/CVE-2023-4932.json) (`2023-12-12T13:43:48.853`) -* [CVE-2023-4958](CVE-2023/CVE-2023-49xx/CVE-2023-4958.json) (`2023-12-12T13:43:48.853`) -* [CVE-2023-38711](CVE-2023/CVE-2023-387xx/CVE-2023-38711.json) (`2023-12-12T13:52:11.970`) -* [CVE-2023-49282](CVE-2023/CVE-2023-492xx/CVE-2023-49282.json) (`2023-12-12T13:53:20.400`) -* [CVE-2023-4015](CVE-2023/CVE-2023-40xx/CVE-2023-4015.json) (`2023-12-12T14:31:41.517`) -* [CVE-2023-30589](CVE-2023/CVE-2023-305xx/CVE-2023-30589.json) (`2023-12-12T14:33:56.690`) -* [CVE-2023-46736](CVE-2023/CVE-2023-467xx/CVE-2023-46736.json) (`2023-12-12T14:34:20.427`) -* [CVE-2023-32254](CVE-2023/CVE-2023-322xx/CVE-2023-32254.json) (`2023-12-12T14:38:38.447`) -* [CVE-2023-32250](CVE-2023/CVE-2023-322xx/CVE-2023-32250.json) (`2023-12-12T14:39:13.577`) -* [CVE-2023-31248](CVE-2023/CVE-2023-312xx/CVE-2023-31248.json) (`2023-12-12T14:39:59.203`) -* [CVE-2023-49094](CVE-2023/CVE-2023-490xx/CVE-2023-49094.json) (`2023-12-12T14:55:06.163`) +* [CVE-2023-49007](CVE-2023/CVE-2023-490xx/CVE-2023-49007.json) (`2023-12-12T17:13:30.867`) +* [CVE-2023-5808](CVE-2023/CVE-2023-58xx/CVE-2023-5808.json) (`2023-12-12T17:15:08.400`) +* [CVE-2023-6538](CVE-2023/CVE-2023-65xx/CVE-2023-6538.json) (`2023-12-12T17:15:08.493`) +* [CVE-2023-6607](CVE-2023/CVE-2023-66xx/CVE-2023-6607.json) (`2023-12-12T17:15:41.850`) +* [CVE-2023-49487](CVE-2023/CVE-2023-494xx/CVE-2023-49487.json) (`2023-12-12T17:19:08.283`) +* [CVE-2023-49247](CVE-2023/CVE-2023-492xx/CVE-2023-49247.json) (`2023-12-12T17:19:24.277`) +* [CVE-2023-49486](CVE-2023/CVE-2023-494xx/CVE-2023-49486.json) (`2023-12-12T17:19:42.290`) +* [CVE-2023-49485](CVE-2023/CVE-2023-494xx/CVE-2023-49485.json) (`2023-12-12T17:19:56.587`) +* [CVE-2023-6146](CVE-2023/CVE-2023-61xx/CVE-2023-6146.json) (`2023-12-12T17:20:59.940`) +* [CVE-2023-6599](CVE-2023/CVE-2023-65xx/CVE-2023-6599.json) (`2023-12-12T17:22:17.503`) +* [CVE-2023-39167](CVE-2023/CVE-2023-391xx/CVE-2023-39167.json) (`2023-12-12T17:43:09.240`) +* [CVE-2023-39172](CVE-2023/CVE-2023-391xx/CVE-2023-39172.json) (`2023-12-12T17:49:44.890`) +* [CVE-2023-39169](CVE-2023/CVE-2023-391xx/CVE-2023-39169.json) (`2023-12-12T17:57:54.800`) +* [CVE-2023-39171](CVE-2023/CVE-2023-391xx/CVE-2023-39171.json) (`2023-12-12T17:59:53.220`) +* [CVE-2023-47440](CVE-2023/CVE-2023-474xx/CVE-2023-47440.json) (`2023-12-12T18:06:36.190`) +* [CVE-2023-41905](CVE-2023/CVE-2023-419xx/CVE-2023-41905.json) (`2023-12-12T18:10:29.040`) +* [CVE-2023-41172](CVE-2023/CVE-2023-411xx/CVE-2023-41172.json) (`2023-12-12T18:11:23.157`) +* [CVE-2023-6275](CVE-2023/CVE-2023-62xx/CVE-2023-6275.json) (`2023-12-12T18:15:23.363`) +* [CVE-2023-39909](CVE-2023/CVE-2023-399xx/CVE-2023-39909.json) (`2023-12-12T18:20:27.780`) +* [CVE-2023-49492](CVE-2023/CVE-2023-494xx/CVE-2023-49492.json) (`2023-12-12T18:21:17.307`) +* [CVE-2023-49493](CVE-2023/CVE-2023-494xx/CVE-2023-49493.json) (`2023-12-12T18:23:26.673`) +* [CVE-2023-6273](CVE-2023/CVE-2023-62xx/CVE-2023-6273.json) (`2023-12-12T18:36:55.433`) +* [CVE-2023-6588](CVE-2023/CVE-2023-65xx/CVE-2023-6588.json) (`2023-12-12T18:50:19.453`) +* [CVE-2023-33411](CVE-2023/CVE-2023-334xx/CVE-2023-33411.json) (`2023-12-12T18:53:04.930`) +* [CVE-2023-40300](CVE-2023/CVE-2023-403xx/CVE-2023-40300.json) (`2023-12-12T18:55:01.573`) ## Download and Usage