From d47f1b11a37dad1314c6c507571a23bce491af9a Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 12 Sep 2023 20:00:28 +0000 Subject: [PATCH] Auto-Update: 2023-09-12T20:00:24.745323+00:00 --- CVE-2015/CVE-2015-88xx/CVE-2015-8859.json | 26 +- CVE-2020/CVE-2020-274xx/CVE-2020-27418.json | 14 +- CVE-2022/CVE-2022-331xx/CVE-2022-33164.json | 63 +- CVE-2022/CVE-2022-349xx/CVE-2022-34918.json | 28 +- CVE-2022/CVE-2022-391xx/CVE-2022-39189.json | 74 +- CVE-2022/CVE-2022-44xx/CVE-2022-4454.json | 6 +- CVE-2023/CVE-2023-01xx/CVE-2023-0119.json | 4 +- CVE-2023/CVE-2023-202xx/CVE-2023-20250.json | 971 ++- CVE-2023/CVE-2023-215xx/CVE-2023-21521.json | 20 + CVE-2023/CVE-2023-215xx/CVE-2023-21522.json | 20 + CVE-2023/CVE-2023-25xx/CVE-2023-2598.json | 48 +- CVE-2023/CVE-2023-285xx/CVE-2023-28560.json | 7252 ++++++++++++++++++- CVE-2023/CVE-2023-293xx/CVE-2023-29332.json | 4 +- CVE-2023/CVE-2023-294xx/CVE-2023-29463.json | 4 +- CVE-2023/CVE-2023-309xx/CVE-2023-30962.json | 43 + CVE-2023/CVE-2023-320xx/CVE-2023-32004.json | 5 +- CVE-2023/CVE-2023-331xx/CVE-2023-33136.json | 4 +- CVE-2023/CVE-2023-344xx/CVE-2023-34469.json | 4 +- CVE-2023/CVE-2023-344xx/CVE-2023-34470.json | 4 +- CVE-2023/CVE-2023-347xx/CVE-2023-34758.json | 6 +- CVE-2023/CVE-2023-353xx/CVE-2023-35355.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36736.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36739.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36740.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36742.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36744.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36745.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36756.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36757.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36758.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36759.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36760.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36761.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36762.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36763.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36764.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36765.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36766.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36767.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36770.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36771.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36772.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36773.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36777.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36788.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36792.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36793.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36794.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36796.json | 4 +- CVE-2023/CVE-2023-367xx/CVE-2023-36799.json | 4 +- CVE-2023/CVE-2023-368xx/CVE-2023-36800.json | 4 +- CVE-2023/CVE-2023-368xx/CVE-2023-36801.json | 4 +- CVE-2023/CVE-2023-368xx/CVE-2023-36802.json | 4 +- CVE-2023/CVE-2023-368xx/CVE-2023-36803.json | 4 +- CVE-2023/CVE-2023-368xx/CVE-2023-36804.json | 4 +- CVE-2023/CVE-2023-368xx/CVE-2023-36805.json | 4 +- CVE-2023/CVE-2023-368xx/CVE-2023-36886.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38139.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38140.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38141.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38142.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38143.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38144.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38146.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38147.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38148.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38149.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38150.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38152.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38155.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38156.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38160.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38161.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38162.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38163.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38164.json | 4 +- CVE-2023/CVE-2023-391xx/CVE-2023-39164.json | 6 +- CVE-2023/CVE-2023-393xx/CVE-2023-39322.json | 79 +- CVE-2023/CVE-2023-397xx/CVE-2023-39712.json | 73 +- CVE-2023/CVE-2023-402xx/CVE-2023-40218.json | 4 +- CVE-2023/CVE-2023-407xx/CVE-2023-40784.json | 4 +- CVE-2023/CVE-2023-409xx/CVE-2023-40942.json | 76 +- CVE-2023/CVE-2023-413xx/CVE-2023-41338.json | 62 +- CVE-2023/CVE-2023-415xx/CVE-2023-41575.json | 63 +- CVE-2023/CVE-2023-415xx/CVE-2023-41578.json | 65 +- CVE-2023/CVE-2023-417xx/CVE-2023-41764.json | 4 +- CVE-2023/CVE-2023-422xx/CVE-2023-42268.json | 65 +- CVE-2023/CVE-2023-44xx/CVE-2023-4498.json | 74 +- CVE-2023/CVE-2023-45xx/CVE-2023-4501.json | 67 + CVE-2023/CVE-2023-47xx/CVE-2023-4782.json | 58 +- CVE-2023/CVE-2023-48xx/CVE-2023-4863.json | 4 +- CVE-2023/CVE-2023-49xx/CVE-2023-4913.json | 4 +- CVE-2023/CVE-2023-49xx/CVE-2023-4914.json | 4 +- README.md | 74 +- 94 files changed, 9339 insertions(+), 271 deletions(-) create mode 100644 CVE-2023/CVE-2023-215xx/CVE-2023-21521.json create mode 100644 CVE-2023/CVE-2023-215xx/CVE-2023-21522.json create mode 100644 CVE-2023/CVE-2023-309xx/CVE-2023-30962.json create mode 100644 CVE-2023/CVE-2023-45xx/CVE-2023-4501.json diff --git a/CVE-2015/CVE-2015-88xx/CVE-2015-8859.json b/CVE-2015/CVE-2015-88xx/CVE-2015-8859.json index 6b6b369fed9..00e83d21852 100644 --- a/CVE-2015/CVE-2015-88xx/CVE-2015-8859.json +++ b/CVE-2015/CVE-2015-88xx/CVE-2015-8859.json @@ -2,8 +2,8 @@ "id": "CVE-2015-8859", "sourceIdentifier": "cve@mitre.org", "published": "2017-01-23T21:59:00.657", - "lastModified": "2017-03-02T02:59:00.790", - "vulnStatus": "Modified", + "lastModified": "2023-09-12T19:42:42.783", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "NVD-CWE-noinfo" } ] } @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.11.0", - "matchCriteriaId": "5EFB26FA-882C-44E3-AED6-BAFFE7F23BA6" + "criteria": "cpe:2.3:a:send_project:send:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "0.11.1", + "matchCriteriaId": "E3AD6A79-80D5-4F94-9768-6914D8E9A13B" } ] } @@ -104,12 +104,18 @@ }, { "url": "http://www.securityfocus.com/bid/96435", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://nodesecurity.io/advisories/56", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] diff --git a/CVE-2020/CVE-2020-274xx/CVE-2020-27418.json b/CVE-2020/CVE-2020-274xx/CVE-2020-27418.json index 4a14c7fd0f3..88881e337b9 100644 --- a/CVE-2020/CVE-2020-274xx/CVE-2020-27418.json +++ b/CVE-2020/CVE-2020-274xx/CVE-2020-27418.json @@ -2,7 +2,7 @@ "id": "CVE-2020-27418", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:20.047", - "lastModified": "2023-08-25T18:12:55.850", + "lastModified": "2023-09-12T18:14:45.473", "vulnStatus": "Analyzed", "descriptions": [ { @@ -17,19 +17,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "baseScore": 4.4, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 0.8, "impactScore": 3.6 } ] diff --git a/CVE-2022/CVE-2022-331xx/CVE-2022-33164.json b/CVE-2022/CVE-2022-331xx/CVE-2022-33164.json index 4026dae9a88..d87e8f6a5cb 100644 --- a/CVE-2022/CVE-2022-331xx/CVE-2022-33164.json +++ b/CVE-2022/CVE-2022-331xx/CVE-2022-33164.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33164", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-09-08T20:15:14.237", - "lastModified": "2023-09-10T19:45:57.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T19:32:37.400", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -46,14 +76,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_directory_server:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C70F0395-89C4-4AC1-BD60-A5ECE55AB0AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/228579", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7031021", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-349xx/CVE-2022-34918.json b/CVE-2022/CVE-2022-349xx/CVE-2022-34918.json index 9c429bfc166..15d0741e71d 100644 --- a/CVE-2022/CVE-2022-349xx/CVE-2022-34918.json +++ b/CVE-2022/CVE-2022-349xx/CVE-2022-34918.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34918", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-04T21:15:07.730", - "lastModified": "2023-05-16T11:00:06.063", + "lastModified": "2023-09-12T19:39:38.350", "vulnStatus": "Analyzed", "descriptions": [ { @@ -77,7 +77,6 @@ ], "configurations": [ { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -87,8 +86,29 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.1", + "versionEndExcluding": "4.14.316", + "matchCriteriaId": "708B805D-F1B9-410C-8231-CD62F16F5739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.284", + "matchCriteriaId": "9112EE64-11F4-46DB-A041-95118F20F81B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.244", + "matchCriteriaId": "79F47095-8BA3-495A-AED3-2CCA5F2838E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", "versionEndExcluding": "5.10.130", - "matchCriteriaId": "D9DE8CDD-0E52-4402-9991-5CAF6A133E21" + "matchCriteriaId": "8BF24898-7C80-443F-93F3-F82029BBFF72" }, { "vulnerable": true, @@ -109,7 +129,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -125,7 +144,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", diff --git a/CVE-2022/CVE-2022-391xx/CVE-2022-39189.json b/CVE-2022/CVE-2022-391xx/CVE-2022-39189.json index b41750af007..49f6a19223c 100644 --- a/CVE-2022/CVE-2022-391xx/CVE-2022-39189.json +++ b/CVE-2022/CVE-2022-391xx/CVE-2022-39189.json @@ -2,8 +2,8 @@ "id": "CVE-2022-39189", "sourceIdentifier": "cve@mitre.org", "published": "2022-09-02T05:15:07.693", - "lastModified": "2023-08-19T18:15:11.363", - "vulnStatus": "Modified", + "lastModified": "2023-09-12T19:41:21.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -60,8 +60,65 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.16", + "versionEndExcluding": "5.4.244", + "matchCriteriaId": "FADC0214-BD61-4A11-B936-B206A73AD588" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5.0", + "versionEndExcluding": "5.10.180", + "matchCriteriaId": "DE17DE03-9DE8-4DC5-92CB-D85B24289C74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.60", + "matchCriteriaId": "350B36C3-FE0B-4EE8-A4C3-CF925DCBD809" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", "versionEndExcluding": "5.18.17", - "matchCriteriaId": "1F280165-1214-41AD-BAC3-E3D0B73AF604" + "matchCriteriaId": "30793531-9841-4C8F-BED2-AC176CCCF48E" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h300s:*:*:*:*:*:*:*", + "matchCriteriaId": "27227B35-932A-4035-B39F-6A455753C0D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*", + "matchCriteriaId": "489D20B9-166F-423D-8C48-A23D3026E33B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410s:*:*:*:*:*:*:*", + "matchCriteriaId": "A4AD592C-222D-4C6F-B176-8145A1A5AFEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h500s:*:*:*:*:*:*:*", + "matchCriteriaId": "8603654B-A8A9-4DEB-B0DD-C82E1C885749" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h700s:*:*:*:*:*:*:*", + "matchCriteriaId": "C855C933-F271-45E6-8E85-8D7CF2EF1BE6" } ] } @@ -105,11 +162,18 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20230214-0007/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5480", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-44xx/CVE-2022-4454.json b/CVE-2022/CVE-2022-44xx/CVE-2022-4454.json index 492b6d635ef..f16acf01d81 100644 --- a/CVE-2022/CVE-2022-44xx/CVE-2022-4454.json +++ b/CVE-2022/CVE-2022-44xx/CVE-2022-4454.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4454", "sourceIdentifier": "cna@vuldb.com", "published": "2022-12-13T18:15:10.623", - "lastModified": "2022-12-19T16:36:44.853", + "lastModified": "2023-09-12T19:39:16.753", "vulnStatus": "Analyzed", "descriptions": [ { @@ -93,9 +93,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:bible-online_project:bible-online:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:m0ver:bible-online:*:*:*:*:*:*:*:*", "versionEndExcluding": "2022-10-02", - "matchCriteriaId": "5011FD05-7087-43A6-8BD6-20AB0CFEF93F" + "matchCriteriaId": "91FB2B85-9D4A-40B9-9F50-47E36D2CE31F" } ] } diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0119.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0119.json index 23fef0fac65..1f8e08133ae 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0119.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0119.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0119", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-12T16:15:08.007", - "lastModified": "2023-09-12T16:15:08.007", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20250.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20250.json index d39e6503145..9eeadc6d84a 100644 --- a/CVE-2023/CVE-2023-202xx/CVE-2023-20250.json +++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20250.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20250", "sourceIdentifier": "ykramarz@cisco.com", "published": "2023-09-06T17:15:50.100", - "lastModified": "2023-09-07T01:10:21.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T19:36:21.083", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -34,10 +54,955 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "85BD0509-E217-46CF-94CC-4AB78B6BA81D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.0.21:*:*:*:*:*:*:*", + "matchCriteriaId": "8AF492FA-ADEF-4AC6-B3B2-5526D6AF9433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.0.30:*:*:*:*:*:*:*", + "matchCriteriaId": "12E9CC14-F5E2-481C-AD37-CB9CCCD00B55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4EE93940-8109-43B9-B507-5B56ED579A99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "0C47E6A4-A40C-4514-A3BE-5032DA06FDF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "29A1B2ED-BE93-4555-ACA3-4FB2C08A027C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.1.99:*:*:*:*:*:*:*", + "matchCriteriaId": "AEA3F230-09E1-4B1B-9B4E-AA7845963252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "505CEC40-9FC2-4480-BC50-07FD412925D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.2.99:*:*:*:*:*:*:*", + "matchCriteriaId": "132D6E49-9EB7-4CDB-AC43-F9837D07BE2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.14:*:*:*:*:*:*:*", + "matchCriteriaId": "2997345F-5C60-4F09-A76F-015E055B87B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.16:*:*:*:*:*:*:*", + "matchCriteriaId": "0C342BE5-6443-48EC-96B7-31BEB46EBC2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.22:*:*:*:*:*:*:*", + "matchCriteriaId": "CED99113-35C3-40A6-AEF0-787EC30F3E8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.28:*:*:*:*:*:*:*", + "matchCriteriaId": "BE17D881-2549-404B-A691-69A94C776595" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.44:*:*:*:*:*:*:*", + "matchCriteriaId": "4A41582B-1C06-4670-BBE5-F91D3383B7DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.45:*:*:*:*:*:*:*", + "matchCriteriaId": "CD675BFB-AAB0-4818-89F2-D624FCDBF516" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.51:*:*:*:*:*:*:*", + "matchCriteriaId": "F4DD0B2C-B62D-43DB-ACA6-BD715E6C1D69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.52:*:*:*:*:*:*:*", + "matchCriteriaId": "1160B6A0-074A-4DC1-9268-4A15F2C75C64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.54:*:*:*:*:*:*:*", + "matchCriteriaId": "E50E1386-D836-436D-A5BC-ACF1AF922F33" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.55:*:*:*:*:*:*:*", + "matchCriteriaId": "670BF7A6-F2C1-4CD4-B6E6-208C95A32E57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.1.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "E8B4AA64-B0EC-428A-8D1D-022C3B5F1F33" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.1.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "66E9978B-498F-46AA-9093-C13DD076EE39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.1.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "5D028A9A-4CDF-4B67-829B-7B7E742FF04C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9988BE-4A76-44B2-9197-977B379C22B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "9F712711-18F7-4FB8-8EBC-B42DC59B67A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.0.10:*:*:*:*:*:*:*", + "matchCriteriaId": "97FC925D-46ED-4AB5-B55B-64C2A0F131AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.0.14:*:*:*:*:*:*:*", + "matchCriteriaId": "2BE05619-C8C9-4BD9-9357-11BF197EBB34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.0.15:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C90303-7941-4B80-A0AB-EB5EBB7D0180" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.0.99:*:*:*:*:*:*:*", + "matchCriteriaId": "91BDFF21-AD3E-4DA8-9F54-B897E784C85F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.1.4:*:*:*:*:*:*:*", + "matchCriteriaId": "466E481B-7DD9-4AA0-B5E5-75BBE3820190" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "D742A59B-AC7F-4249-AC40-44C63BECC86C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7A069D95-07D8-435B-B7BB-98785F930C74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "57701D90-EEC9-4105-9633-673EFCD69BC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "B1A70E10-227E-44E2-8558-58B37CCF63D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "FF28AEEA-34F1-40F1-ACDC-25FDD56EA282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.3.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DEAE8829-4F41-42CD-81C1-C2A0160254BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.3.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "133B77B5-F9D5-48DC-B197-BDBE6704DDDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.3.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "054EA087-0584-42F8-A7CF-84A6A964E627" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.3.0.99:*:*:*:*:*:*:*", + "matchCriteriaId": "429D901C-359F-4250-8C49-D032C03728B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "455E3BAA-D45F-4502-92A4-770EC05BE781" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.3.1.4:*:*:*:*:*:*:*", + "matchCriteriaId": "BA113E1F-35E5-4D11-8D18-85AE8415E027" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.3.1.5:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E7CD5D-6AD6-4028-A1DE-DC38E96BE8AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "818DD411-2312-4BC8-8909-8392B26EDA7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20E8ECAC-E842-41DB-9612-9374A9648DC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "C28C88A2-4E12-4FAB-B9CD-88FAD97D28F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.0.21:*:*:*:*:*:*:*", + "matchCriteriaId": "93CFB437-9467-406D-AD7B-F1E669110394" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.0.30:*:*:*:*:*:*:*", + "matchCriteriaId": "D03E1ABF-BCAA-4559-A5E6-78FAC4A7226A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "284BFD6A-E8EA-4E25-94F8-3C7285D77662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DCEAE05F-9820-4B74-BE69-15EFBB17912B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "298D0C39-083A-45C4-BD25-FA625C876B14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.1.99:*:*:*:*:*:*:*", + "matchCriteriaId": "379B2D64-6410-4398-9180-EE058F54F11F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "E70BC0DA-E0C2-4C00-B773-22BA22E73565" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.2.99:*:*:*:*:*:*:*", + "matchCriteriaId": "BFA2771F-A24F-4588-A2F1-BD2302ECAC46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.14:*:*:*:*:*:*:*", + "matchCriteriaId": "D5C936A7-1483-4A0E-850B-F618C4D34954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.16:*:*:*:*:*:*:*", + "matchCriteriaId": "6208D4F9-2364-4B8B-9E0A-5A8CB8C9BCA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.22:*:*:*:*:*:*:*", + "matchCriteriaId": "F03BC6F9-7C9C-43F3-B456-275AD8573BF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.28:*:*:*:*:*:*:*", + "matchCriteriaId": "31C6658C-2F10-4606-9F4A-C2F11E9C97FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.44:*:*:*:*:*:*:*", + "matchCriteriaId": "58880230-54F3-45E9-9F0C-079E1D62AC87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.45:*:*:*:*:*:*:*", + "matchCriteriaId": "4B29E20E-C0F0-4C9C-AA08-7307773EBB18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.51:*:*:*:*:*:*:*", + "matchCriteriaId": "CABF35FC-ADA8-4685-AE64-59E154A647A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.52:*:*:*:*:*:*:*", + "matchCriteriaId": "317F8BC3-73D9-4277-9213-5CA1DE80356D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.54:*:*:*:*:*:*:*", + "matchCriteriaId": "9AE444E6-2632-4137-9499-961B3716984E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.55:*:*:*:*:*:*:*", + "matchCriteriaId": "0E8376ED-8273-4296-A90F-AA16156B8104" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.1.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "2ED476F0-B4FE-4A27-AD18-7B306B4A880F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.1.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "5A99AF72-A118-4FBF-9376-FCBF29572FB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.1.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "2D419F7C-5D21-4A35-B038-F6673F5708E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "1852B10D-58CA-4656-9325-73FE8ACE6998" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "B8126A48-3496-46B1-818B-6A6ED839218F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.0.10:*:*:*:*:*:*:*", + "matchCriteriaId": "F617A360-7FDF-47EB-AAA2-10FD749808B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.0.14:*:*:*:*:*:*:*", + "matchCriteriaId": "B8687A68-8F82-471F-BD8D-E9A1C9467B1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.0.15:*:*:*:*:*:*:*", + "matchCriteriaId": "D7DD5F37-1377-4497-848A-0F72B4902821" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.0.99:*:*:*:*:*:*:*", + "matchCriteriaId": "A7F85E65-6B98-4DA0-98A8-65E353588CBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.1.4:*:*:*:*:*:*:*", + "matchCriteriaId": "ED2E8B08-9AB4-4C06-9308-FF157D2C2EAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "E5C28AA2-635F-4D0A-8D01-25B34F715C6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "566E726A-D668-4532-B842-8C435C5AAA18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "CBECE2AC-CE19-494A-82B7-967237AAB92A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "A08450D0-3260-45F7-B7BE-59BDA64E816F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "1CA4AB9C-B969-4076-8C60-AC1F15057D0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.3.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "117AD898-3217-464A-AFAC-2AD4E5F0CBB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.3.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "925A92DC-9996-4CE2-BC80-3B57D2120374" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.3.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "9A7D95BD-5C61-4D71-A155-83D5F0005027" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.3.0.99:*:*:*:*:*:*:*", + "matchCriteriaId": "00E2372F-A07E-418F-A698-52C98BCB04E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BC73150C-F62A-4E81-8587-68F3969A37A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.3.1.4:*:*:*:*:*:*:*", + "matchCriteriaId": "614FA0AD-3591-44C4-B2DD-8242C1D42F88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.3.1.5:*:*:*:*:*:*:*", + "matchCriteriaId": "DC412EDF-53BB-4B7B-9DB7-04EE6332C459" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130_firmware:1.3.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4AA081A3-C57E-4480-A3F9-E82383C60575" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:rv130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5D233CF-2504-4E69-9AD0-D3B631C8FC11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "0C7B4C3B-ACB9-4B6B-A04B-943C4A5CEDF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.0.21:*:*:*:*:*:*:*", + "matchCriteriaId": "ECCF42F5-8626-4D23-85B9-95644C7E98BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.0.30:*:*:*:*:*:*:*", + "matchCriteriaId": "640373F0-F395-4007-B26C-A43AF3F9E551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0E185A2E-7958-4A0D-AD54-DE5A2DC1FA3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "41EC53E2-7AC9-4998-9917-4C510E2BCBA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "B33F37F5-3A46-406F-9743-E5148EC27169" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.1.99:*:*:*:*:*:*:*", + "matchCriteriaId": "A5D6E63E-F5F7-4A2F-90D7-0DAEA147BD93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "36A6781B-AC64-431F-959A-674F4C50F5C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.2.99:*:*:*:*:*:*:*", + "matchCriteriaId": "2CE45FAD-4923-4F29-A0F2-F5D4F760A069" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.14:*:*:*:*:*:*:*", + "matchCriteriaId": "198D6B01-8AFB-4192-AA23-90AB81C0E641" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.16:*:*:*:*:*:*:*", + "matchCriteriaId": "8A90BA88-76B8-48B9-B3A3-7DBE4A329C94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.22:*:*:*:*:*:*:*", + "matchCriteriaId": "CC96B47A-7AE0-48B3-9DCF-9E63D6067BB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.28:*:*:*:*:*:*:*", + "matchCriteriaId": "22E1468B-BF8C-4356-880A-8EBA4AA39CFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.44:*:*:*:*:*:*:*", + "matchCriteriaId": "D5F6B3EC-7B4B-48B7-A621-85810FA066AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.45:*:*:*:*:*:*:*", + "matchCriteriaId": "E2825F4F-5AC7-457F-AE08-FCC25BD650CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.51:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBE6464-64A6-41E2-B661-30A8063C07C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.52:*:*:*:*:*:*:*", + "matchCriteriaId": "F636420E-F91B-45D6-ABB4-B701AC7D7063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.54:*:*:*:*:*:*:*", + "matchCriteriaId": "EBD7186A-EEE8-4BC8-ABA8-593F02C6283B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.55:*:*:*:*:*:*:*", + "matchCriteriaId": "FF66A7CE-469A-48CD-AE85-2F49E1C505FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.1.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "08794FE4-9CB0-4C96-B26F-A09F26092064" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.1.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "3DC7EDDE-B22D-405C-881D-4C0784DBEF9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.1.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "B22E38D9-DBAE-41BD-9D40-3DE0F1D0CB1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "4EF45BF5-2310-41DA-925A-6EB41E0E268B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "57043FE9-4969-4A0B-A742-4FB56D745639" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.0.10:*:*:*:*:*:*:*", + "matchCriteriaId": "0F68A5E6-1ED8-46BD-B73B-37A297219A01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.0.14:*:*:*:*:*:*:*", + "matchCriteriaId": "8786FBE0-51C6-4CBD-B3F2-89F287EAA093" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.0.15:*:*:*:*:*:*:*", + "matchCriteriaId": "EDA03A86-5438-42BE-B50F-049A0BBEA843" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.0.99:*:*:*:*:*:*:*", + "matchCriteriaId": "80DB1F39-597E-4A68-A6EE-07B5247237FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.1.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DDEFAEC1-55C0-4FAF-B986-FCFC81C24D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "A4DC6A77-4D7B-4373-9447-141707086EE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "49AD3869-9553-4FC8-9BBA-FF814E34B3C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "703A0590-D4A6-47E9-9CAA-C4A4A553560F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "8DCD0AD1-1FFD-4A08-A113-3801ABD56534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "AB9EA4F1-ED61-4ED1-8678-1F6BD75007E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.3.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "2C940D23-7EA4-43E4-A01A-6CC4EF203753" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.3.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "240A6B22-09B9-4656-BD4F-4C2E329A3C3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.3.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "44C3199D-7D0F-4210-BC2B-BDDB9C3FD196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.3.0.99:*:*:*:*:*:*:*", + "matchCriteriaId": "D814F9AC-3E09-4509-A5E5-24560E9A0F10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D4B38F3C-0935-486B-AE88-6E946728943D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.3.1.4:*:*:*:*:*:*:*", + "matchCriteriaId": "CAD1FFB6-8707-445A-81EF-389A56896FD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.3.1.5:*:*:*:*:*:*:*", + "matchCriteriaId": "BD56B903-96E0-4BAD-B7D4-4856E8D67AC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "F04F9D87-B28C-45AE-9AD3-477A1DE65CE6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3C9AFAA-1387-4067-AF7E-2E4AAD2A272A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E5CC2CC2-006F-4E4F-9A4C-792CC551FD4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.0.21:*:*:*:*:*:*:*", + "matchCriteriaId": "04A87F88-BCD3-4042-B220-9739AE00AAEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.0.30:*:*:*:*:*:*:*", + "matchCriteriaId": "B89C7B5A-49D0-48D1-829B-BCA69FE8AF6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A1024CBE-BF8D-487F-B759-3A14F9598D22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "003D0694-E2C4-4372-A4B3-70EBA908CA52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "7D286CFE-A3C9-4D2B-B2BE-0F1653237692" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.1.99:*:*:*:*:*:*:*", + "matchCriteriaId": "B71CFC58-AD8B-4E98-9E30-5A98BF7F0435" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "F57591A8-E41A-4343-B90B-899E9A098DE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.2.99:*:*:*:*:*:*:*", + "matchCriteriaId": "4C5DD9A2-E716-4923-A473-7964E613566A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.14:*:*:*:*:*:*:*", + "matchCriteriaId": "F2CA109E-3ED1-4891-8111-1514F5594FC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.16:*:*:*:*:*:*:*", + "matchCriteriaId": "21DDB9A7-C0A9-45D5-9054-28B8FAEE5E09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.22:*:*:*:*:*:*:*", + "matchCriteriaId": "9185CA86-F321-42DE-A599-ABB1838A88A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.28:*:*:*:*:*:*:*", + "matchCriteriaId": "C23840E2-344E-48AC-AD2A-8CC869242ED8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.44:*:*:*:*:*:*:*", + "matchCriteriaId": "D4749115-5558-4741-BF55-8B0CE1D46616" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.45:*:*:*:*:*:*:*", + "matchCriteriaId": "EC9A1F5D-7B18-4EE7-9C32-6DE7C1443E21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.51:*:*:*:*:*:*:*", + "matchCriteriaId": "9F935A71-F131-421F-9005-9D7521F8A56C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.52:*:*:*:*:*:*:*", + "matchCriteriaId": "1609CB6E-9973-45BD-B8AB-EAE87700FE09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.54:*:*:*:*:*:*:*", + "matchCriteriaId": "F2FF87AC-944C-4B06-825D-E10985418F5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.55:*:*:*:*:*:*:*", + "matchCriteriaId": "0909B440-99B7-43BE-BD8F-65EB3CF941ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.1.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "B109BB09-DF8C-4087-8C16-BF17D12A2863" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.1.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "FA7BD747-2A0C-4ADE-9CD8-391676F9C070" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.1.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9AAFA0-B13C-4E07-AC34-D669AB71B3FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "94521BCD-6874-4C51-8038-B84C0D0BF2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "AD17D068-AE75-4788-9CB2-73E03F85CD66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.0.10:*:*:*:*:*:*:*", + "matchCriteriaId": "79C06CBE-8482-40F1-899C-78D7C05094D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.0.14:*:*:*:*:*:*:*", + "matchCriteriaId": "4F96C05D-C899-4D1B-B45A-A30F2DE3A731" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.0.15:*:*:*:*:*:*:*", + "matchCriteriaId": "E8A6EAAE-3AA3-4A52-97F0-71EC67677681" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.0.99:*:*:*:*:*:*:*", + "matchCriteriaId": "59C70BA1-A1EF-4AD2-8B88-003A2B1C27B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.1.4:*:*:*:*:*:*:*", + "matchCriteriaId": "7E416D4D-6BF3-4596-972F-F0D258FC9E1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "34BEC7B6-9300-4B6D-A9A3-797CCBB7B3FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EA4DD911-3153-4693-9E68-4700ACE307E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "1F4683B1-9749-4C83-B14C-C67666ACB8A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "686ADCCF-EEAE-4BF4-A202-87C1F6D06417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "127CDFCA-5654-43EE-AF91-B56D668A0907" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "BFE123D6-4E3F-4B30-9219-64487ADFBBA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "962B7F13-6D32-476B-8940-86D9CDE6979D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "BDBBA31F-317B-4DA8-B72B-5E92497B6E7B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.0.99:*:*:*:*:*:*:*", + "matchCriteriaId": "C48AE727-C755-464D-9E95-978C73D11483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8FA02F2D-CDDE-4730-B771-C201A6370775" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.1.4:*:*:*:*:*:*:*", + "matchCriteriaId": "BC5C0B09-4492-481D-9548-2DBE1F5D746E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.1.5:*:*:*:*:*:*:*", + "matchCriteriaId": "9875284D-70CB-42C0-85C0-DE4191FC8F13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "65ECB6E7-5740-4EE8-9F3F-D4579D3ED608" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:rv215w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8686AB22-F757-468A-930B-DDE45B508969" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-stack-SHYv2f5N", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21521.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21521.json new file mode 100644 index 00000000000..16e9c98c231 --- /dev/null +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21521.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-21521", + "sourceIdentifier": "secure@blackberry.com", + "published": "2023-09-12T19:15:36.033", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "\nAn SQL Injection vulnerability in the Management Console?\u00a0(Operator Audit Trail) of BlackBerry AtHoc version 7.15 could allow an attacker to potentially read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database, recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system.\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000112406", + "source": "secure@blackberry.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21522.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21522.json new file mode 100644 index 00000000000..19173c4d390 --- /dev/null +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21522.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-21522", + "sourceIdentifier": "secure@blackberry.com", + "published": "2023-09-12T19:15:36.153", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "\nA Reflected Cross-site Scripting (XSS) vulnerability in the Management Console (Reports) of Blackberry AtHoc version 7.15 could allow an attacker to potentially control a script that is executed in the victim's browser then they can execute script commands in the context of the affected user account.\u00a0" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000112406", + "source": "secure@blackberry.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2598.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2598.json index 123ebfe49e4..a56829a8c33 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2598.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2598.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2598", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-01T01:15:17.867", - "lastModified": "2023-07-03T16:15:09.547", - "vulnStatus": "Modified", + "lastModified": "2023-09-12T19:41:14.247", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -67,8 +67,43 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.3", - "versionEndIncluding": "6.3.6", - "matchCriteriaId": "4A731D23-D6F9-49F4-AFA3-BAAB3F0CBB48" + "versionEndExcluding": "6.3.2", + "matchCriteriaId": "38F6F330-91A0-4675-8B90-6F950471A7CC" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h300s:*:*:*:*:*:*:*", + "matchCriteriaId": "27227B35-932A-4035-B39F-6A455753C0D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*", + "matchCriteriaId": "489D20B9-166F-423D-8C48-A23D3026E33B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410s:*:*:*:*:*:*:*", + "matchCriteriaId": "A4AD592C-222D-4C6F-B176-8145A1A5AFEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h500s:*:*:*:*:*:*:*", + "matchCriteriaId": "8603654B-A8A9-4DEB-B0DD-C82E1C885749" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h700s:*:*:*:*:*:*:*", + "matchCriteriaId": "C855C933-F271-45E6-8E85-8D7CF2EF1BE6" } ] } @@ -78,7 +113,10 @@ "references": [ { "url": "https://security.netapp.com/advisory/ntap-20230703-0006/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2023/05/08/3", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28560.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28560.json index 61ab22068d7..ae429d602e7 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28560.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28560.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28560", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-09-05T07:15:13.763", - "lastModified": "2023-09-05T12:54:51.627", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T19:46:13.190", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "product-security@qualcomm.com", "type": "Secondary", @@ -34,10 +54,7236 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:apq8076_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A4CAA77-CC4D-49CF-9696-6C2542B31415" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:apq8076:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E19E8B60-4C5C-4D1C-B9F0-AB1FC1F58949" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:apq8084_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E0E1355-0ED3-42B8-B4EB-BC5869532296" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:apq8084:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BBC2E532-1298-4B43-9EF8-AE37E1338EED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:apq8092_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF8D0C2A-3444-45EA-81BC-F72BE9D2F0FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:apq8092:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B678CB4A-A4B4-45AF-9218-AFC30A5B71ED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:apq8094_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83BCBAD4-F51F-43E8-8865-C07B47EA6417" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:apq8094:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20239319-ACA6-4249-815D-C10D5E39A16A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB1DE046-DD70-4ACA-9DF4-59939DAC1889" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B032F871-3EC2-427D-A06F-681A58075925" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73286FFB-C267-46B7-8FEF-C96534656AF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AA32CC0-DE30-4B15-8EC6-1FAF14C5C4E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "770F3924-BE27-4BDE-B922-680B3C9753EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19013619-9B73-4A4F-B5B2-2A7D9A41D81E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9523ACC9-9D2F-4A40-9CEF-9A9676176867" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34AB9074-97A3-43F0-B829-CDB4E3066AC4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*", + "matchCriteriaId": "362252ED-1DB3-4CF6-86DD-14919826D75E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn785x-1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C41266FF-5555-4522-AD55-6A7CF8BA33D5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn785x-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E9C428C-7470-4178-9029-3234086D93F1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn785x-5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04EA12D4-24E2-4FE9-8CD6-06A8E36DEB2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn785x-5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AED978B-0330-4B9B-B662-AA8E9E621996" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96FBD6DF-F174-4690-AA3D-1E8974E3627F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BF86E1-3FAC-4A42-8C01-5944C6C30AE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn685x-5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A3CF46D-E1CB-447E-8371-15C3F49B1AA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn685x-5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B74FDAF1-82D0-4136-BF97-25C56FCEE77C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn685x-1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A07C2049-B227-4849-85D0-B53D690C7697" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn685x-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88D2DB07-B72B-4D44-A373-0C7EAB35F388" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca4020_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97E02FD6-F0A7-4B60-9ED8-26AAE497AEED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca4020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A732D0D-E999-4CE8-9448-FC6BA7FCC0A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C359D1E7-6E0A-41B5-ABE5-B55598960700" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4DC3CE7-0C4A-458B-A42E-8F80C062DD5F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_214_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C241123-63B1-4CA2-A3CB-BADA86EAAA2E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_214_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66E4B95D-966A-4940-A403-9E8241F121C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_216_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68309F58-91D9-407E-9578-17EAF6836E07" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_216_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0D491A9-6A1F-4B62-9A30-5A9F592BD5B5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_316_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA6CA3E5-7A0F-4705-985E-0C25DE609494" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_316_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC770BF-4B23-4F43-A0B9-E5FE41536F5E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_318_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84B4531C-9D90-4A9B-8724-1428372319C8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_318_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "497EC79B-0879-4FA2-A5B7-63EA54FC20A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq4018_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D65E62B-95CA-4229-A61B-F4FB70466B6E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq4018:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1339CEEF-34C9-426E-864B-6C7B68E72CAA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94CB547F-0078-47CD-B511-06DE96882D5A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA679375-BB14-4B24-8AD9-B2BFBACE2FDB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq4028_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3525CD2A-CE43-4B42-B8C2-9B19B2551214" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq4028:-:*:*:*:*:*:*:*", + "matchCriteriaId": "010DBDB1-F1A3-4805-BDD2-84CBFA0A0BE1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq4029_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D21F293-B9C7-46CB-8D83-BEE27E899BC3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq4029:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4BA4D00-D7B2-4152-BD82-E6F572655AF3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8543C671-054B-489F-ACFE-B7D7BEC1DEE6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq5010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15C5F8CB-3291-4E13-94F0-680FC85A9669" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AE3085F-59BE-46A0-9A96-65CFAB7DFEAE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq5028:-:*:*:*:*:*:*:*", + "matchCriteriaId": "825524E0-BB01-4CAD-9F65-95E096467D28" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA7A5C46-48BF-42A9-A477-A660C6D7B437" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDB79382-19D6-4A67-9013-7099A9C58829" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6005_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4695A9D-A02C-4E73-A327-E811C55B4EDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6005:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28E41848-525C-4126-89C2-54BD193768DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5CF970F-17AE-4C59-89A5-5B41A41E1DE0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71C54A70-AAA8-4B5E-AC1B-471A5C7E79B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B04589FF-F299-4EF6-A57B-1AD145372DBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDC1ADAD-DA77-47EF-8DB9-C36961C560C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06126F30-D081-4A11-92FB-4074A451FAF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2550040-CCC7-4B52-8D3E-7948B3E3C62B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A1CC1C1-F2CA-4C43-B9E9-1288C3496C7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC82552A-9E7C-4A13-B7A5-43CEA218675C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8065_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F37542D-35FD-4B15-8882-DD7543FF4E3D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8065:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A7A9919-4B34-4960-ADC7-04A176579B80" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8068_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3CB8796-7976-4077-BFF3-04DAEF5C8DDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8068:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E848E5C5-F6C6-4FA1-93A6-C7737D69BB15" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8069_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C818E621-4286-485B-96E3-AB485F16BD8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8069:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87CFC07B-1F10-4AC8-85D8-5BE76FE35FB3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8070_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C670A4C5-1F17-4F1E-91DC-A33A9BA8878A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8070:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACC9F136-90A7-486F-AF2A-EC60125E5AF8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "711FC14F-4DED-4F90-9BA5-0036537E6DCF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "302F06C0-4835-4CD6-B745-BF7B704C3C86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8071_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA6FF982-7B4C-40F8-8A79-49CD234930DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8071:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77052755-6A86-4ED7-B45C-32F884D27C64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "623ED6A2-EE37-458E-BEFA-8BAD08256AE8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53449B68-4C58-4AEB-82B7-72726ADE0E2C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8072_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83357A1C-633B-4814-ABB5-A8AC2AC12990" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8072:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C4A7555-7224-403A-9B7D-23D1622623B7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93E5DB9B-F388-49F3-ABD5-CE773FC4B045" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0137E60A-1869-479C-9B4B-378E5FCCBA1D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2914BF98-E69C-4C8D-8B10-759642ADD7B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2118C404-402F-463C-8160-3CC3B703DF30" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C7691C2-C4F8-4F23-9B5F-5E8FE0E2293E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02BF2E50-E2A4-44FF-9748-ED96C0C1AB5F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "966392A8-DD8E-4AA1-B407-5BF2D937139E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A211C022-8EDF-4B76-89D6-599812900446" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF245F8E-C056-4BEF-982E-9616F8C65CD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE302EF9-165F-47F9-B0D6-BE1E3D8C6C65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A24951FD-C4AB-4988-A1DD-019412430AC6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFEC5D65-C1E3-40ED-9FE3-8DF888CA2654" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF609C6C-CD50-423A-A75E-83C730296089" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8B35C18-9A01-41E1-8CE9-D8FA7E4A25ED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8890C528-C2A3-4148-A397-85B63FB920C4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81494D75-1D4D-4DC5-AF67-F83FD562DBB9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BB84228-3083-4048-8E83-E1F30B537223" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB58F259-62BA-40B9-BD71-960F25D20BED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9235m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5E11E2D3-357A-42AE-B5CA-7C57C6F16F7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9235m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2306EA19-4EF3-40C1-ADF7-F7137A732C74" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9330_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC8F7F3C-D31B-400C-A4CB-DB30027E9B16" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F9133B8-5415-4840-BD0A-54ACF3F26988" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9EF77DD1-BE11-4132-9889-646196FAE567" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB323C15-2018-4CB8-858E-56F088B03FBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca1990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D00F3FE8-83F3-46E4-9DD9-8A716E24C226" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca1990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9136B88F-3C3D-471F-8589-CA0BA4473B4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFB39496-8699-4DAF-BD7B-AE69260B20CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9CFBC24-5F15-40DE-806E-62C1EE808992" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca4010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F1CE4C-CAF8-4AB9-B44D-ADC2F2E7CF4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca4010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "30C10881-C26D-452D-A2D1-8617C2709D60" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6164_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF093219-0593-4318-A726-382022D6C7BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6164:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC0A77BD-F36A-468B-A7D6-EC8989D58575" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0814A50-D8E6-42BD-A0A3-0768A3E28F53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D2AD8F5C-1FEB-45C2-BC8F-123C2BEB0EA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B0F8ED6-EAE7-44EA-A8C6-F5AD408261F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886CF046-E1D9-4FD4-AC02-EAB61C3F70FD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "059486E9-3F99-4C65-A763-470564EDAF2C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "966CDA56-809F-4FF4-909D-0DD92F44CF67" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C90747B4-2CC0-4816-A994-58E00F5ADA05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6428_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9382B5-AEB1-41E6-9F25-B0EDC95363C9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6428:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDFC0DFF-F13A-4804-890C-99AFA0C56D62" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6438_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8D7658D-692D-4873-8D41-7682E9ECAEB3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6438:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB8993C2-1E06-4ACF-B1E8-A62D89EBF4A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B1397F3-8CCF-4BBA-9F0F-A12E4F045754" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5888224-567D-4C84-BE6D-17B636BF506C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93ED74CE-6BF2-4983-8780-07D5336745B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", + "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca7500_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D4F8296-D8D0-42C6-AAD2-24DA0DB403D4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca7500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14EC7373-E5F3-4D2B-B727-CAEE772B74BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC8A5A87-7D62-4EB7-962A-0F160DE3E889" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B68D126-7F49-4FFA-8AF8-78120973D78E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98E58C63-F253-4DCC-8A14-48FEB64B4C3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25565FDA-651D-4A05-8B1E-2188B6921253" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8D49750-BBEA-4A3D-9898-28B7A50A7F42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9531_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E71452E6-551F-4E93-9951-2582C60BDFCE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9531:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D69FB0E-FDFF-42B8-ADAD-797B7C91E979" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9558_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2A974EE-8003-4482-BC09-F7C24AB20267" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9558:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6F2B1C1-8267-43EA-B3FA-314A588F4A6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9561_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8256ECFF-0CC0-4EB4-9B6D-BAA697CC739B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9561:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66B8E884-7D65-4EF9-BB56-FD8EDD7075F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9880_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F81D132-B2DD-4D09-8561-21A2CFBCC9FA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9880:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F099A893-232B-48FB-81B3-F01AF2A19426" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9882_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EF5BF57-BA27-4845-956D-39ED5FBADE6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9882:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BFE4A19-B8BD-44F8-8AF0-689E497A271B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "311229F9-4A32-462D-AE8D-E5E2B2C416CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A523C3F-FB62-4728-8173-4C117C28AC5A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9887_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35BE591A-1EAE-4067-810E-D4A37F6187C4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9887:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2190E138-0C63-49F7-815B-1B7E6C2C4C67" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF227702-EEFC-43CC-AC80-81EA6E4927E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE5DFEA5-EA29-40B6-83DB-883B276E8245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "728CCD27-ED06-49FD-AECD-9B0856813EDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D181868-AE93-4116-B45F-81D94F537227" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9898_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49882EDE-598D-40B2-8A65-D258241E669F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9898:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1572D87-4EC2-4B95-826A-B03FDD4985AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DCBC53AC-E040-40E0-B09B-4117E641C9D4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AE49086-E95B-4852-8A09-16A83DD63EC9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9982_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32B9AE1B-0E97-4A38-B33D-6EB9DC67B158" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9982:-:*:*:*:*:*:*:*", + "matchCriteriaId": "684FC997-B2E2-4DF3-85ED-A8F8C986FD2B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93BA2DC9-5B4F-4F8F-8B3D-8DA01043B9BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FA8880F-E513-4390-B839-C5D86E7A89EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9985_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED6C33CE-635A-415F-9F4E-70E2D86A06D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "124FF4F3-0490-4CB8-8689-5F0FA6D9230F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9986_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70DBC461-DFD7-419E-8241-B55913315D45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9986:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E9EC919-0F83-49F3-807B-CD4B27AAE741" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9987_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77057B7D-E70A-4F74-A141-14B0DD798247" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9987:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0B7DFC6-5D6A-4B73-B5F8-6C2073E0EBE0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "991D9592-D61E-4777-8B59-EB004F09998E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37A829C8-5BA3-4B13-9033-30FCD5B78B70" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9992_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D8FB66C-5616-4C3A-9CAE-7610519ACA1A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9992:-:*:*:*:*:*:*:*", + "matchCriteriaId": "408C8494-E7D8-4F99-9B04-7E84A31C799B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9994_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD5B18AA-0699-4F21-9D3E-C45B071B4903" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9994:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDC4C800-C9E3-4DB0-AE99-3F75D3660DEC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "214A053F-D80C-4AD9-B4F1-83384095A3F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74EBA77E-69A5-4145-9BEC-CD39BA132309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*", + "matchCriteriaId": "163FE96E-DF5B-4B67-8EDE-44A5B9A8492D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FBB16DC4-CDC9-4936-9C6A-0ED8E1F6D056" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5021_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0F7D48A-7D06-46C5-A093-FAA12666A666" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5021:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58DF7FA9-72B4-454D-AED7-ED9531B118BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "478B79F0-D257-41B2-965B-3E251A584D45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B6D2C9D-1BF9-4D78-90FB-B7633DD87E67" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63965F19-033E-4755-B9CA-EF409EC339A3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCA0E68F-6D5F-4C20-AABC-26CA6867D3D6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85740DB4-3B08-48A4-ACAF-7BBB2612009A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A0BD404-5EBA-4988-91B6-ECE8FCF4F041" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5054_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D6190FE-17A6-48CE-AA34-5DCF01362E9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5054:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09AB1C26-7ED2-431E-8EA4-8ACB16857A01" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5064_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0405CBFB-AD0E-45F8-ADDA-60D2BF7486C0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5064:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08F4DD2E-C887-424C-B931-CBB9B402726E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5121_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7582D75-412A-4CF8-9507-FB9AD10FBCC0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5121:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E1CA0C2-13AD-4D4F-9FCD-882E2045D871" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "290BFC8A-0D76-4BCD-B059-2DAFD368A10C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*", + "matchCriteriaId": "936A308A-92B9-468C-9BC6-8FD71C7C2315" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A9F76FF-96D3-4BCE-918D-B3B0ADA3E8E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2908A543-EFE4-477D-9CF3-76534B2E6CF6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EAE1EBF-AD14-4C07-99B5-2547A5196B20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4829FF9-C0BA-4E40-A01A-3EF179462029" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0ED3ED74-C2D0-4A84-A2F8-392818E5CD20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F1CA219-959D-481A-8622-69F1825832FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F6EAD64-D133-42C4-92ED-90C49938C0F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93E7ED58-C5A7-4F78-8233-750780CCAB16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0A436BB-212C-4419-A0C7-03C0E04BD582" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AF4B33B-223D-45F5-8168-3D2232E11663" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63FF89C5-3BBF-4A13-8A3B-F490C2FA1A95" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6784EC5F-2C26-49C5-9A03-6FD2056C04EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A988BD3-71D8-4F2B-9EC2-8E385B114114" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6122:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E7049A3-9F35-465F-9B2E-96788E54EC63" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A59FBBDC-0495-422C-B25A-FFDF94D33C34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6132:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6E55C06-45EE-4144-8CBC-4D41DDE4D899" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C9D1966-30F0-414D-BE75-0A14B12A1457" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD28C87D-1D28-4C84-BFE4-56EE3BF2C6B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F466A5BD-1912-4811-9A93-81555F101D46" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F92914E-16F6-4A25-9FEF-FB7CB3377132" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BCCFF8B-4857-439D-BD4A-EB35672F474B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86896D55-89F5-440B-9082-916E486B65D9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36A10EB2-E7A2-461F-836E-FC38B9428C98" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A457C1D6-A026-4B5F-9CB1-FA795785A515" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C10CAAC-FD93-4116-9F0C-E983B3693FAF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FEC2402-BA39-49BB-A34C-FF32ED44A158" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "809FD84D-11C5-4EE3-B830-62CF5F6CB1BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFD77A52-D53C-424F-9E17-160B710469C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B31EEE9E-CDEC-4E88-B950-3413205E483E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E1E341A-7DDD-47E5-BB5F-0666482B41C0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76E03AE9-2485-449B-BCFD-3E452BB01FC6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFCB9F22-57F2-4327-95B9-B2342A02E45E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DA2C3E1-E285-4CAD-9FA3-813C8EC436F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfe1922_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB11E143-E871-42D7-8B8B-A0CB9D33EC63" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfe1922:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B46CE16F-74E6-4B6C-9423-0634D54EC9AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfe1952_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DD24EC7-16C3-4192-96A7-4F820C9531FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfe1952:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C3739CB-D4FE-4247-A32C-4641741DCF0C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "022D7D87-F60F-4DD2-9E0B-A9DFD3D69B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37FA5777-1B35-4BD1-BB81-CB5DE62F3D56" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DED4B719-53B5-4D16-B3FA-ADE29D28ED86" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D342C86B-E184-457C-9F72-BD853ED79425" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C751ABFE-3B9B-472B-A10C-277270790D95" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C819454D-D413-478A-B78D-CFF6994803A1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_455_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3EF9964-D615-473E-A289-8A01D91D87AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_455:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C177163-B6E6-42D8-8969-C2F9832C6701" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "589C1001-E9F6-41A6-BCC8-A94A3C97F2E6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D1A7C-537F-458B-BA56-A11F95E36EA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "716DEC4D-D854-44CD-8A14-AA5AFD96809E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52036768-810C-40C2-9213-8397A4073703" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE8AB22C-54EA-4D61-B6F9-7BC45820D29E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3991C516-4FBE-43D8-835F-413FE45BF73E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CF5EBB-B25A-4A76-B522-951F108263CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BE7001-5539-4C5E-A064-6E62023803AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06661DAC-5D22-433E-B5EC-486931E265B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B8DA94C-23A0-4C99-9F05-144B9B5224B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39E10E22-E7CC-41D6-80F3-030083F45645" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1497D052-884E-496B-BEF8-6904A25125ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "589F4888-28F6-4ECA-860E-8054C2A8C419" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC4DA7EA-DB81-4C71-A875-2612D8D7D726" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*", + "matchCriteriaId": "48F26F64-98D4-420A-8918-E5E56ABA1D47" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC508C49-0B76-43A8-B2AF-0F8EB989E238" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9665200-D306-4EEB-9F42-6C5963524179" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd821_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A54F4A3-19E3-4825-98C7-DA632D692A06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd821:-:*:*:*:*:*:*:*", + "matchCriteriaId": "028CD81A-0D9D-40B0-9E2F-DC8689607B24" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFA7BB42-305C-451F-92D8-0718DF68A012" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B93301-AFE8-409B-A8C8-6754BE5A0C14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B185412C-177F-48E2-87F9-1269E0FB8E31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4450_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8F57DB5E-863C-4CA1-B7C0-DD8FCA50F835" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E3F3930-3C47-4A0D-ADC2-2641AE1CC02C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FACA2BF1-85D3-447F-A08D-B90330A22550" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2ABA18D-82C1-4366-B1D7-DED42DD3D5C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3FB2972-94B6-4716-BA96-4B452BA3990F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57F4F872-094E-4E27-BB89-D8251FAFB713" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C61BF93F-53DF-4399-AF41-45CEC1E0A2B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CC498E0-B82B-4A53-8F55-6C1DA58AFA88" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:apq5053-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35953900-1F81-49B4-B2F4-A0FEEF0E4F08" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:apq5053-aa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21E3FCA2-6CD3-4C63-9EFB-783FEF08D170" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117FAAF8-4E79-4BA8-BF6B-4572C114890F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "233283A4-193F-430A-8019-EE1B83668E36" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4250-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8615FCF8-2AEB-4820-A0F8-DFCE50DFB465" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4250-aa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "977DF595-DA7A-48E0-BD7D-2CD89F63D037" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D4BDA33-248D-4040-B07D-2A9D80C64709" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0DB9382-CF2F-4690-ABCA-145CDA12F4AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4350-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86F03E3C-CDEE-46AF-9CD6-4C58BAA4514E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4350-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "887B369C-4398-4D8F-A95A-B9A8E9B1C1B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_630_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "531A9325-790A-4D7E-BFF2-EB1808C719D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_630_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1AACB4E-70A7-43ED-953D-911D2450C946" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_636_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C558A35-E8E3-43CD-BAC5-C665875D3E60" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_636_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F23BF59-9FB7-49D6-846D-52263747E69F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_652_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1697A64C-39C0-4687-B209-645CAFF3D86C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_652_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD370EA6-2BE5-4224-818C-209C4A06D785" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "873CD3BE-2098-4328-B350-A14453C44F1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_660_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE294B26-BBD0-455F-82B0-4605987B7DDC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37DF4D73-3ACC-41B3-8CA4-20DAECE6BFB7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_662_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE08D23A-2D0D-4472-8847-27B955F55165" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE529BF7-0C9B-4B79-ABF8-54D5051F5E94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "124227C1-DC7A-4A44-A513-C83976464BD3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00865826-86AE-425F-BE6F-162F611FB200" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CC0441C-C30B-4D99-9BAD-C1E4387302BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_675_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABF96A66-FECF-4D2F-94C5-7BFC746789E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_675_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28638583-F98D-4B88-AF50-A10642D6A105" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6150-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "559BBC7F-CF94-4524-AF8A-172013131EED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6150-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21BE75B1-0CB5-44DD-920E-B09B1A122C78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6225_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC2668D5-623D-4E13-AF37-6F7040A14007" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6225:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72B0F4C7-CA0F-4B9C-A6AA-60934B2AB2C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6225-ad_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E089DC83-3849-4671-95B9-E4C958EC79FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6225-ad:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E38F8F04-F841-492B-A555-96DBD7461380" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E5A7CE-9356-4E00-8458-52C60CB34753" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "571CC514-7B65-4769-9921-149ABFF2FE74" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "737807F6-F62C-4EC5-903A-0BA996834164" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B79990C-AAD2-4A91-A806-E449838054BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D045BE4B-BC19-4A51-90E6-00C18389C81B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F006960-CDE3-4E74-B4F0-2C4B2CA93959" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm712_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9F51997-505C-4090-B146-C22DE8BD9E7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm712:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB63CBC4-57F8-486C-A2C8-6061B596ECBD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "055E464C-C63A-455E-97B0-0D8A266A428F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "527A0A00-0C6C-4937-87A3-00668CF7BACB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7150-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E66B0335-F592-4670-8E7D-7952396B88CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7150-aa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FA9B931-E55A-4717-A700-C3717B681824" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7150-ab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DB73734-92EE-4123-8D02-C7D0CE3029C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7150-ab:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4D107A6-3120-4B08-B34C-A8C180474DDB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7150-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA93759-49DD-4E86-93C7-AACC9F9E9346" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7150-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D072F051-A8C8-488A-971A-6A5A705837BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7225_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34E2940C-5D85-4D05-A1B1-41E20DF01626" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7225:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CAD2B248-B205-4D7A-B03B-9AC3CEFF8760" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6809F530-FA3C-455E-AF16-41F57AC3F5D4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250-aa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "464E833D-9FCA-4407-88A2-EDE7D4FAEA28" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250-ab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "437D618B-FE47-4DF6-9174-B1335501862D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250-ab:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4616FA92-3DB7-4ABC-A804-92B9FC7D57AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A51EAC73-7C74-4ABC-A964-8FE2CCB1C930" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DF142AB-6BB0-43BE-B2F1-679A4BD123D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc7180-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C4AF477-933A-4BD5-9713-349DF5721D56" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc7180-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6D5D11A-DEFD-44A9-AA13-6D048D95825D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc7180-ad_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "145000B1-5D57-4654-BEC5-0F1B6369AE0D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc7180-ad:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50BCE5F1-EA5C-47FD-BF43-FF85D33EA847" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_808_processor_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D7C75B23-C5CB-4D69-9D27-660C3E18B781" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_808_processor:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B909B92B-64B2-42C1-A662-A40BCC90DEB4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_810_processor_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C81A1DA3-FD45-4916-AFE4-D7E0BE4779A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_810_processor:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BCFCB125-49A3-4AE7-9722-9C7FDF32A334" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:s820a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "482F1C72-713F-4D3A-805C-D6BCA2E9D519" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:s820a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CD783AA-2CAD-448E-9C4D-4AA6D4C95A55" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5799B243-F73E-483B-A2A4-6DB25AEBB08D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D534FDF-3084-4FAC-800E-D71497F9DDFB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_821_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6A92FCC-A844-448F-9291-4E923ACA55E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_821_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CF4B1EC-D38A-4FAD-8A4E-D0521F66005E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:8098_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE7A51B-739F-4264-B978-25DC9620B638" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:8098:-:*:*:*:*:*:*:*", + "matchCriteriaId": "134C30E3-8D6D-4BD2-8FBD-91CC4D614BC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:8998_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F10CB414-1CA8-4AC1-8E16-841AC2E87FDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:8998:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A028D7DE-ED28-44BA-8D59-92DFC827FCAB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D56B0CD3-138D-4197-84D5-2887C8FA40D2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_845_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E289B26-AF53-442A-9740-2F44D1F59DA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_850_mobile_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "355080DC-FC83-45C1-AB1A-21533638C181" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_850_mobile_compute_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5167E425-3B5D-4F79-B6AF-599820BEB33E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9286B1E8-E39F-4DAA-8969-311CA2A0A8AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19B9AE36-87A9-4EE7-87C8-CCA2DCF51039" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8150-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC335397-8340-4DD4-B8D1-9AB6E9911F85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8150-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB6CF9F9-8EEE-49AD-B17D-60470F2F9D57" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180x-ad_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2802A422-CCEA-4634-B164-09AC35C00C2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180x-ad:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AB65F7E-6921-44AA-8B2C-C4814BD51A7F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180xp-ad_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7EB4CA4-CEAF-4D8C-AE28-5373CC5E46D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180xp-ad:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B12A03C-20D1-452A-99E6-BA94C02BA982" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180x-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89811F0E-0226-4657-B0E0-5C03FAAEE0AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180x-aa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD6A5576-6766-4E65-A8C1-7215DC0EC128" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180x-ab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "797F1912-4F43-4CA6-83DA-620C4623CB94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180x-ab:-:*:*:*:*:*:*:*", + "matchCriteriaId": "419CEB14-21A1-4B9B-A2E7-C5F76FED07D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180xp-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61C77656-153F-4DA8-9C7C-BCAAFD25E0A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180xp-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DFDC9D5-81AB-4B4E-AB78-691B8A389C86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180xp-af_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B7DFFD6-92C7-4042-BD8F-D3E6FDB7958C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180xp-af:-:*:*:*:*:*:*:*", + "matchCriteriaId": "007B494C-4AAD-4E74-BD16-C62A643BC241" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180x-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEC4BF9B-2B98-44FF-9B81-25C10AB71E24" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180x-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02C5409B-4D98-4F3D-9902-41A5394342C9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180x-af_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B66319C-184B-4417-85D6-4F8AB51B578E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180x-af:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C8DA78-9E96-4140-961F-B2BD80ACCE54" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180xp-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53AE3110-9F78-45E8-BAD9-2C63ACD7489B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180xp-aa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "819D5879-EE22-4E6B-B401-D02F7FC68679" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180xp-ab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6EBD06A6-7156-4363-AECB-6CA872008B54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180xp-ab:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFEBF216-405D-462B-9345-3146315F6744" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69D1567F-D669-4415-9A08-110221EFA6BA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x50_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF808C56-AD46-4351-9A46-6A2B6AAAB5BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1E1B7FD-39CD-42AB-A113-2AFB25B5F85B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C93EECE3-7A8A-4B58-A674-134040CE43FE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_4g_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C8F12FE-0057-4A13-9A7F-D12C114ECEF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_4g_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1271B0C7-2D91-4129-9B58-E6689DD68C39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF839E24-6542-4C5D-A1B7-FD3BA00683CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9F12284-93E0-482D-9D35-EB38BA7D6C6D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_300_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1708266E-EB99-475A-AB48-B2ACEE5657EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_300_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FEBBF98A-40C2-4386-85C5-5B1D445CC846" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2EEFADBF-D751-499B-80E5-C1069E129F18" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D327FBA1-69B5-467B-9B1B-A0380994D21B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B05FD66D-13A6-40E9-A64B-E428378F237E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D665C1-3EBA-42F2-BF56-55E6C365F7DF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43A90019-4E96-40B5-9E4D-CCBDD51ACA34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC3D23FE-B3D5-4EC3-8268-98F12181966D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2503805B-B2A6-4AEE-8AB1-2B8A040702BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3AD370C-2ED0-43CF-83D9-50DC92A01CA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DAFD64E7-3F13-4DCA-8C46-6E8FE0C6F798" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "044A14FB-64F6-4200-AC85-8DC91C31BD16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9590EF1F-E821-4525-943B-4A315ACAEFFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A7D32B3-325E-4B1F-8649-3D0071396BBA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF49BC31-A332-4B9A-A826-F63116D7029F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DD3C245-D5F8-4145-8CDF-F635D2C8F088" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29332.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29332.json index 41fd52da142..7812d847a97 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29332.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29332.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29332", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:08.790", - "lastModified": "2023-09-12T17:15:08.790", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29463.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29463.json index a1edc702d27..e6f8c728b62 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29463.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29463.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29463", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2023-09-12T17:15:09.147", - "lastModified": "2023-09-12T17:15:09.147", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-309xx/CVE-2023-30962.json b/CVE-2023/CVE-2023-309xx/CVE-2023-30962.json new file mode 100644 index 00000000000..f498bd7dcc1 --- /dev/null +++ b/CVE-2023/CVE-2023-309xx/CVE-2023-30962.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-30962", + "sourceIdentifier": "cve-coordination@palantir.com", + "published": "2023-09-12T19:15:36.237", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The Gotham Cerberus service was found to have a stored cross-site scripting (XSS) vulnerability that could have allowed an attacker with access to Gotham to launch attacks against other users. This vulnerability is resolved in Cerberus 100.230704.0-27-g031dd58 ." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@palantir.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "references": [ + { + "url": "https://palantir.safebase.us/?tcuUid=92dd599a-07e2-43a8-956a-9c9566794be0", + "source": "cve-coordination@palantir.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32004.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32004.json index c50949290fb..f15ebd62188 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32004.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32004.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32004", "sourceIdentifier": "support@hackerone.com", "published": "2023-08-15T16:15:11.303", - "lastModified": "2023-08-22T14:13:14.530", + "lastModified": "2023-09-12T19:54:07.643", "vulnStatus": "Analyzed", "descriptions": [ { @@ -56,8 +56,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", + "versionStartIncluding": "20.0.0", "versionEndIncluding": "20.5.0", - "matchCriteriaId": "C643F785-3B58-442C-802A-5ED5D5D6566A" + "matchCriteriaId": "145E971E-F0AF-49A7-8A9C-3AAFE01C076B" } ] } diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33136.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33136.json index aa30880e1cc..4a895dc4886 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33136.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33136.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33136", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:09.353", - "lastModified": "2023-09-12T17:15:09.353", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34469.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34469.json index 4f6c47a1060..c8eb1966f5e 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34469.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34469.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34469", "sourceIdentifier": "biossecurity@ami.com", "published": "2023-09-12T16:15:09.050", - "lastModified": "2023-09-12T16:15:09.050", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34470.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34470.json index fd3d07e9176..6137fa35a20 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34470.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34470.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34470", "sourceIdentifier": "biossecurity@ami.com", "published": "2023-09-12T16:15:09.273", - "lastModified": "2023-09-12T16:15:09.273", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-347xx/CVE-2023-34758.json b/CVE-2023/CVE-2023-347xx/CVE-2023-34758.json index a65aa05eb4f..f2eb2bba737 100644 --- a/CVE-2023/CVE-2023-347xx/CVE-2023-34758.json +++ b/CVE-2023/CVE-2023-347xx/CVE-2023-34758.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34758", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-28T12:15:09.007", - "lastModified": "2023-09-01T13:57:27.690", + "lastModified": "2023-09-12T19:39:31.640", "vulnStatus": "Analyzed", "descriptions": [ { @@ -55,10 +55,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:bishopfox:silver:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:bishopfox:sliver:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.5.0", "versionEndExcluding": "1.5.40", - "matchCriteriaId": "6E0B85DC-5DD3-4CDD-9E5D-D3B4B5B341ED" + "matchCriteriaId": "11847E81-39F7-4881-A036-D4E675D4AFE2" } ] } diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35355.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35355.json index 7260d38f7d4..d91dd5ff2a6 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35355.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35355.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35355", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:09.510", - "lastModified": "2023-09-12T17:15:09.510", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36736.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36736.json index be1d71e45f7..cb5f4ec1954 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36736.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36736.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36736", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:09.703", - "lastModified": "2023-09-12T17:15:09.703", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36739.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36739.json index bbd97ede5dd..60e036cc1b3 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36739.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36739.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36739", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:09.893", - "lastModified": "2023-09-12T17:15:09.893", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36740.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36740.json index cf2eeb84070..bfbebf33295 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36740.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36740.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36740", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:10.093", - "lastModified": "2023-09-12T17:15:10.093", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36742.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36742.json index 84efea80bdc..64772e301fb 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36742.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36742.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36742", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:10.317", - "lastModified": "2023-09-12T17:15:10.317", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36744.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36744.json index bd806a09414..d1d34af48c5 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36744.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36744.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36744", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:10.467", - "lastModified": "2023-09-12T17:15:10.467", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36745.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36745.json index 15ad0dd3cda..6b008ad6d8d 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36745.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36745.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36745", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:10.697", - "lastModified": "2023-09-12T17:15:10.697", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36756.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36756.json index 7ecdc1e5fa1..687147e2f42 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36756.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36756.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36756", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:10.927", - "lastModified": "2023-09-12T17:15:10.927", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36757.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36757.json index 29710c35604..7e1b109446c 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36757.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36757.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36757", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:11.077", - "lastModified": "2023-09-12T17:15:11.077", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36758.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36758.json index 6217f6f00ab..c67675dedcc 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36758.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36758.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36758", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:11.267", - "lastModified": "2023-09-12T17:15:11.267", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36759.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36759.json index f8437fc6a92..e1d4b284586 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36759.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36759.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36759", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:11.513", - "lastModified": "2023-09-12T17:15:11.513", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36760.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36760.json index 494a81dbdd9..6bbb7e67fbc 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36760.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36760.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36760", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:11.783", - "lastModified": "2023-09-12T17:15:11.783", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36761.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36761.json index 4b85ee58cc8..eea9a5ef313 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36761.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36761.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36761", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:11.987", - "lastModified": "2023-09-12T17:15:11.987", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36762.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36762.json index 6b9cf16c311..fa84dd60934 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36762.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36762.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36762", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:12.177", - "lastModified": "2023-09-12T17:15:12.177", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36763.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36763.json index 926c0afcd3a..3c09b8f3eb0 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36763.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36763.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36763", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:12.450", - "lastModified": "2023-09-12T17:15:12.450", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36764.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36764.json index 7841ff3fa1c..feda1b6e40c 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36764.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36764.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36764", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:12.633", - "lastModified": "2023-09-12T17:15:12.633", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36765.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36765.json index 6569fdbb217..e77d919612a 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36765.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36765.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36765", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:12.800", - "lastModified": "2023-09-12T17:15:12.800", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36766.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36766.json index e844461800b..573afc3f27e 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36766.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36766.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36766", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:12.950", - "lastModified": "2023-09-12T17:15:12.950", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36767.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36767.json index 6a89b0661e0..e1b86baa3f2 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36767.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36767.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36767", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:13.180", - "lastModified": "2023-09-12T17:15:13.180", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36770.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36770.json index 1073b47c6b7..a57d6ca3a55 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36770.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36770.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36770", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:13.260", - "lastModified": "2023-09-12T17:15:13.260", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36771.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36771.json index 79e9e5932bf..51d597c6e9f 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36771.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36771.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36771", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:13.353", - "lastModified": "2023-09-12T17:15:13.353", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36772.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36772.json index 7016c04a2e2..6a88addc624 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36772.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36772.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36772", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:13.660", - "lastModified": "2023-09-12T17:15:13.660", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36773.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36773.json index 39e9faceb93..24f9baf37ba 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36773.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36773.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36773", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:14.080", - "lastModified": "2023-09-12T17:15:14.080", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36777.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36777.json index 8256ade5c57..d557cf3ae28 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36777.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36777.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36777", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:14.180", - "lastModified": "2023-09-12T17:15:14.180", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36788.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36788.json index 65035b242a6..09af1737465 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36788.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36788.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36788", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:14.437", - "lastModified": "2023-09-12T17:15:14.437", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36792.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36792.json index 65089a4c479..e987dc7a8bd 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36792.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36792.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36792", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:14.510", - "lastModified": "2023-09-12T17:15:14.510", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36793.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36793.json index 72e3903d3b1..5b652c2a249 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36793.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36793.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36793", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:14.627", - "lastModified": "2023-09-12T17:15:14.627", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36794.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36794.json index eef69a6c1b5..adea9cf4ca4 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36794.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36794.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36794", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:14.947", - "lastModified": "2023-09-12T17:15:14.947", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36796.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36796.json index 7779e60fa22..4b9df0edbb1 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36796.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36796.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36796", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:15.173", - "lastModified": "2023-09-12T17:15:15.173", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36799.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36799.json index 359304def0e..8ec7b2b1870 100644 --- a/CVE-2023/CVE-2023-367xx/CVE-2023-36799.json +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36799.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36799", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:15.253", - "lastModified": "2023-09-12T17:15:15.253", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36800.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36800.json index 5703f2ec595..1ddf6317149 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36800.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36800.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36800", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:15.330", - "lastModified": "2023-09-12T17:15:15.330", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36801.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36801.json index 56bb850b265..78c08948e61 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36801.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36801.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36801", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:15.407", - "lastModified": "2023-09-12T17:15:15.407", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36802.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36802.json index 4f6f277ae66..f44722ff48e 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36802.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36802.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36802", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:15.487", - "lastModified": "2023-09-12T17:15:15.487", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36803.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36803.json index fc2688d8720..c93c16d3877 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36803.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36803.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36803", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:15.717", - "lastModified": "2023-09-12T17:15:15.717", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36804.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36804.json index d64749369c2..cd7dd6d5acc 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36804.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36804.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36804", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:16.043", - "lastModified": "2023-09-12T17:15:16.043", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36805.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36805.json index 9541844e90c..631779522be 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36805.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36805.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36805", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:16.233", - "lastModified": "2023-09-12T17:15:16.233", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36886.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36886.json index a55e01af7bb..056c2bafcda 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36886.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36886.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36886", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:16.397", - "lastModified": "2023-09-12T17:15:16.397", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38139.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38139.json index 57c8e109b8f..6fb9ddc8c50 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38139.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38139.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38139", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:16.470", - "lastModified": "2023-09-12T17:15:16.470", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38140.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38140.json index d6042e97e31..f5ee9aa64e5 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38140.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38140.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38140", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:16.547", - "lastModified": "2023-09-12T17:15:16.547", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38141.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38141.json index 82836685763..2d04f55fe7f 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38141.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38141.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38141", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:16.723", - "lastModified": "2023-09-12T17:15:16.723", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38142.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38142.json index e117ab750ad..b4b6192209a 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38142.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38142.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38142", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:17.057", - "lastModified": "2023-09-12T17:15:17.057", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38143.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38143.json index 4f6aed41392..d2b2f56a94f 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38143.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38143.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38143", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:17.367", - "lastModified": "2023-09-12T17:15:17.367", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38144.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38144.json index c26de7de4ac..cd1bf77a062 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38144.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38144.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38144", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:17.647", - "lastModified": "2023-09-12T17:15:17.647", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38146.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38146.json index ed559551ba0..5e746f4e2b0 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38146.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38146.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38146", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:17.807", - "lastModified": "2023-09-12T17:15:17.807", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38147.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38147.json index b5af0918ba4..62d246b0a39 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38147.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38147.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38147", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:18.130", - "lastModified": "2023-09-12T17:15:18.130", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38148.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38148.json index 3a3204fccd8..7eab9862d17 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38148.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38148.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38148", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:18.387", - "lastModified": "2023-09-12T17:15:18.387", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38149.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38149.json index 4e30c83eca7..f42f2bd0197 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38149.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38149.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38149", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:18.467", - "lastModified": "2023-09-12T17:15:18.467", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38150.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38150.json index 1bec3671b06..8a41dedadee 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38150.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38150.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38150", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:18.557", - "lastModified": "2023-09-12T17:15:18.557", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38152.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38152.json index f8f3f45f6f6..d5056d27bea 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38152.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38152.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38152", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:18.910", - "lastModified": "2023-09-12T17:15:18.910", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38155.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38155.json index 9f0cca3f2cf..3d7dff3a0c0 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38155.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38155.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38155", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:19.527", - "lastModified": "2023-09-12T17:15:19.527", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38156.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38156.json index 6cfb4c7cd7c..9d81b73be6d 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38156.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38156.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38156", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:21.123", - "lastModified": "2023-09-12T17:15:21.123", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38160.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38160.json index e39e4f414a7..134e0188415 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38160.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38160.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38160", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:21.850", - "lastModified": "2023-09-12T17:15:21.850", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38161.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38161.json index 63fb8e06ce9..bad4400df92 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38161.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38161.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38161", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:22.850", - "lastModified": "2023-09-12T17:15:22.850", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38162.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38162.json index 6ab9acf4eee..2591da399a9 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38162.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38162.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38162", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:23.567", - "lastModified": "2023-09-12T17:15:23.567", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38163.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38163.json index 22edd6f1e4d..d0f0dc5495f 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38163.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38163.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38163", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:23.840", - "lastModified": "2023-09-12T17:15:23.840", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38164.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38164.json index 671045c1c85..9932474ec64 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38164.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38164.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38164", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:24.080", - "lastModified": "2023-09-12T17:15:24.080", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39164.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39164.json index b0884a17a22..77e2e15c2e7 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39164.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39164.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39164", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T10:15:09.097", - "lastModified": "2023-09-06T22:24:41.070", + "lastModified": "2023-09-12T19:42:29.390", "vulnStatus": "Analyzed", "descriptions": [ { @@ -75,9 +75,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:molongui:molongui:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:amitzy:molongui:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "4.6.20", - "matchCriteriaId": "A3B97AE0-EA7D-4CD2-960C-3052D5688862" + "matchCriteriaId": "EDAC446F-73BC-4F20-9EB6-F999961B2760" } ] } diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39322.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39322.json index 2bf8ff40f74..e957d5c6dd9 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39322.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39322.json @@ -2,16 +2,49 @@ "id": "CVE-2023-39322", "sourceIdentifier": "security@golang.org", "published": "2023-09-08T17:15:28.120", - "lastModified": "2023-09-08T17:36:26.487", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T18:07:29.257", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + }, { "source": "security@golang.org", "type": "Secondary", @@ -23,22 +56,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.21.0", + "versionEndExcluding": "1.21.1", + "matchCriteriaId": "958E1BA0-2840-47E9-A790-79C10164C68C" + } + ] + } + ] + } + ], "references": [ { "url": "https://go.dev/cl/523039", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Patch" + ] }, { "url": "https://go.dev/issue/62266", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Release Notes" + ] }, { "url": "https://pkg.go.dev/vuln/GO-2023-2045", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-397xx/CVE-2023-39712.json b/CVE-2023/CVE-2023-397xx/CVE-2023-39712.json index c1641d3f260..a83fd348e5a 100644 --- a/CVE-2023/CVE-2023-397xx/CVE-2023-39712.json +++ b/CVE-2023/CVE-2023-397xx/CVE-2023-39712.json @@ -2,27 +2,88 @@ "id": "CVE-2023-39712", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-08T18:15:07.647", - "lastModified": "2023-09-10T19:45:57.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T18:28:56.037", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Free and Open Source Inventory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name, Address, and Company parameters under the Add New Put section." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:free_and_open_source_inventory_management_system_project:free_and_open_source_inventory_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "ED4E30A0-0847-427A-9B08-FB699FCC7958" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Arajawat007/836b586cfb8faeb4edbe57ff1c5dc457#file-cve-2023-39712", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.sourcecodester.com/php/16741/free-and-open-source-inventory-management-system-php-source-code.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40218.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40218.json index 23895b140ae..328bdbcff01 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40218.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40218.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40218", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-12T15:15:23.767", - "lastModified": "2023-09-12T15:15:23.767", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40784.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40784.json index 5a440f57d22..6a8f633e0fd 100644 --- a/CVE-2023/CVE-2023-407xx/CVE-2023-40784.json +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40784.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40784", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-12T15:15:24.170", - "lastModified": "2023-09-12T15:15:24.170", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-409xx/CVE-2023-40942.json b/CVE-2023/CVE-2023-409xx/CVE-2023-40942.json index 1d1f6491823..83a7029fbce 100644 --- a/CVE-2023/CVE-2023-409xx/CVE-2023-40942.json +++ b/CVE-2023/CVE-2023-409xx/CVE-2023-40942.json @@ -2,19 +2,87 @@ "id": "CVE-2023-40942", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-07T15:15:07.767", - "lastModified": "2023-09-07T16:25:45.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T19:55:13.077", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Tenda AC9 V3.0BR_V15.03.06.42_multi_TD01 was discovered stack overflow via parameter 'firewall_value' at url /goform/SetFirewallCfg." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tendacn:ac9_firmware:15.03.06.42_multi_td0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B8F0DC-1319-4DA8-BAA9-2C6467607E4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tendacn:ac9:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CA49FEFD-41B5-4038-883D-989AB85D6CF5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/GleamingEyes/vul/blob/main/tenda_ac9/SetFirewallCfg.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-413xx/CVE-2023-41338.json b/CVE-2023/CVE-2023-413xx/CVE-2023-41338.json index 41e79583183..ac0b583b688 100644 --- a/CVE-2023/CVE-2023-413xx/CVE-2023-41338.json +++ b/CVE-2023/CVE-2023-413xx/CVE-2023-41338.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41338", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-08T19:15:43.977", - "lastModified": "2023-09-10T19:45:57.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T19:12:29.057", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,22 +66,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gofiber:fiber:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.49.2", + "matchCriteriaId": "DC21F2CF-3B2C-4803-AF42-0377FB5CD6AD" + } + ] + } + ] + } + ], "references": [ { "url": "https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Technical Description" + ] }, { "url": "https://docs.gofiber.io/api/ctx#isfromlocal", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/gofiber/fiber/commit/b8c9ede6efa231116c4bd8bb9d5e03eac1cb76dc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/gofiber/fiber/security/advisories/GHSA-3q5p-3558-364f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-415xx/CVE-2023-41575.json b/CVE-2023/CVE-2023-415xx/CVE-2023-41575.json index 9ad4cdd642a..21e91cc0151 100644 --- a/CVE-2023/CVE-2023-415xx/CVE-2023-41575.json +++ b/CVE-2023/CVE-2023-415xx/CVE-2023-41575.json @@ -2,19 +2,74 @@ "id": "CVE-2023-41575", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-08T19:15:44.087", - "lastModified": "2023-09-10T19:45:57.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T19:14:47.017", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in /bbdms/sign-up.php of Blood Bank & Donor Management v2.2 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Full Name, Message, or Address parameters." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:blood_bank_\\&_donor_management_system_project:blood_bank_\\&_donor_management_system:2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "8E3A7305-2915-4C4F-9982-1C5C484E9C56" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/soundarkutty/Stored-xss/blob/main/poc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-415xx/CVE-2023-41578.json b/CVE-2023/CVE-2023-415xx/CVE-2023-41578.json index b10143bc015..921b15f883c 100644 --- a/CVE-2023/CVE-2023-415xx/CVE-2023-41578.json +++ b/CVE-2023/CVE-2023-415xx/CVE-2023-41578.json @@ -2,19 +2,76 @@ "id": "CVE-2023-41578", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-08T19:15:44.147", - "lastModified": "2023-09-10T19:45:57.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T19:22:28.260", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Jeecg boot up to v3.5.3 was discovered to contain an arbitrary file read vulnerability via the interface /testConnection." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.5.3", + "matchCriteriaId": "AB2E1EE1-D408-4689-8A4F-CDF2C09DAC83" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Snakinya/Bugs/issues/1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41764.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41764.json index a1b204d6d13..9f6923dab72 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41764.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41764.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41764", "sourceIdentifier": "secure@microsoft.com", "published": "2023-09-12T17:15:24.247", - "lastModified": "2023-09-12T17:15:24.247", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42268.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42268.json index 044fc9be4a5..8045de2ed90 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42268.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42268.json @@ -2,19 +2,76 @@ "id": "CVE-2023-42268", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-08T19:15:44.200", - "lastModified": "2023-09-10T19:45:57.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T19:24:30.050", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Jeecg boot up to v3.5.3 was discovered to contain a SQL injection vulnerability via the component /jeecg-boot/jmreport/show." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.5.3", + "matchCriteriaId": "AB2E1EE1-D408-4689-8A4F-CDF2C09DAC83" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jeecgboot/jeecg-boot/issues/5311", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4498.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4498.json index e228b2efc24..00d8267f12c 100644 --- a/CVE-2023/CVE-2023-44xx/CVE-2023-4498.json +++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4498.json @@ -2,16 +2,49 @@ "id": "CVE-2023-4498", "sourceIdentifier": "cret@cert.org", "published": "2023-09-06T17:15:50.687", - "lastModified": "2023-09-07T01:10:21.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T19:30:28.330", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Tenda N300 Wireless N VDSL2 Modem Router allows unauthenticated access to pages that in turn should be accessible to authenticated users only" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, { "source": "cret@cert.org", "type": "Secondary", @@ -23,10 +56,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:n300_firmware:53.0.1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "DB091842-330A-4314-9D61-391AC527B2BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:n300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "64464B02-CC9C-4086-8EBE-CAFC797239C8" + } + ] + } + ] + } + ], "references": [ { "url": "https://kb.cert.org/vuls/id/304455", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4501.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4501.json new file mode 100644 index 00000000000..f52b15c9d08 --- /dev/null +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4501.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2023-4501", + "sourceIdentifier": "security@opentext.com", + "published": "2023-09-12T19:15:36.333", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "User authentication with username and password credentials is ineffective in OpenText (Micro Focus) Visual COBOL, COBOL Server, Enterprise Developer, and Enterprise Server (including product variants such as Enterprise Test Server), versions 7.0 patch updates 19 and 20, 8.0 patch updates 8 and 9, and 9.0 patch update 1, when LDAP-based authentication is used with certain configurations. When the vulnerability is active, authentication succeeds with any valid username, regardless of whether the password is correct; it may also succeed with an invalid username (and any password). This allows an attacker with access to the product to impersonate any user.\n\nMitigations: The issue is corrected in the upcoming patch update for each affected product. Product overlays and workaround instructions are available through OpenText Support. The vulnerable configurations are believed to be uncommon.\n\nAdministrators can test for the vulnerability in their installations by attempting to sign on to a Visual COBOL or Enterprise Server component such as ESCWA using a valid username and incorrect password.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-253" + }, + { + "lang": "en", + "value": "CWE-287" + }, + { + "lang": "en", + "value": "CWE-305" + }, + { + "lang": "en", + "value": "CWE-358" + } + ] + } + ], + "references": [ + { + "url": "https://portal.microfocus.com/s/article/KM000021287", + "source": "security@opentext.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4782.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4782.json index 125f0ec9954..03122d0789f 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4782.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4782.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4782", "sourceIdentifier": "security@hashicorp.com", "published": "2023-09-08T18:15:07.707", - "lastModified": "2023-09-10T19:45:57.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-12T18:34:45.990", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security@hashicorp.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "security@hashicorp.com", "type": "Secondary", @@ -46,10 +76,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hashicorp:terraform:*:*:*:*:*:-:*:*", + "versionStartIncluding": "1.0.8", + "versionEndExcluding": "1.5.7", + "matchCriteriaId": "E78E02B6-400E-40A8-A6A8-2C2B7DD5182D" + } + ] + } + ] + } + ], "references": [ { "url": "https://discuss.hashicorp.com/t/hcsec-2023-27-terraform-allows-arbitrary-file-write-during-init-operation/58082", - "source": "security@hashicorp.com" + "source": "security@hashicorp.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json index becbe07f2b0..a59ea4b0033 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4863", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-09-12T15:15:24.327", - "lastModified": "2023-09-12T15:15:24.327", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4913.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4913.json index 47faaf0be28..5109de988f8 100644 --- a/CVE-2023/CVE-2023-49xx/CVE-2023-4913.json +++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4913.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4913", "sourceIdentifier": "security@huntr.dev", "published": "2023-09-12T15:15:24.447", - "lastModified": "2023-09-12T15:15:24.447", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4914.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4914.json index 889b8f05922..062ac6bb829 100644 --- a/CVE-2023/CVE-2023-49xx/CVE-2023-4914.json +++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4914.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4914", "sourceIdentifier": "security@huntr.dev", "published": "2023-09-12T15:15:24.717", - "lastModified": "2023-09-12T15:15:24.717", - "vulnStatus": "Received", + "lastModified": "2023-09-12T19:38:09.050", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 1313b361f66..4979e30b889 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-09-12T18:00:25.144722+00:00 +2023-09-12T20:00:24.745323+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-09-12T17:59:17.887000+00:00 +2023-09-12T19:55:13.077000+00:00 ``` ### Last Data Feed Release @@ -29,54 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -224809 +224813 ``` ### CVEs added in the last Commit -Recently added CVEs: `63` +Recently added CVEs: `4` -* [CVE-2023-36802](CVE-2023/CVE-2023-368xx/CVE-2023-36802.json) (`2023-09-12T17:15:15.487`) -* [CVE-2023-36803](CVE-2023/CVE-2023-368xx/CVE-2023-36803.json) (`2023-09-12T17:15:15.717`) -* [CVE-2023-36804](CVE-2023/CVE-2023-368xx/CVE-2023-36804.json) (`2023-09-12T17:15:16.043`) -* [CVE-2023-36805](CVE-2023/CVE-2023-368xx/CVE-2023-36805.json) (`2023-09-12T17:15:16.233`) -* [CVE-2023-36886](CVE-2023/CVE-2023-368xx/CVE-2023-36886.json) (`2023-09-12T17:15:16.397`) -* [CVE-2023-38139](CVE-2023/CVE-2023-381xx/CVE-2023-38139.json) (`2023-09-12T17:15:16.470`) -* [CVE-2023-38140](CVE-2023/CVE-2023-381xx/CVE-2023-38140.json) (`2023-09-12T17:15:16.547`) -* [CVE-2023-38141](CVE-2023/CVE-2023-381xx/CVE-2023-38141.json) (`2023-09-12T17:15:16.723`) -* [CVE-2023-38142](CVE-2023/CVE-2023-381xx/CVE-2023-38142.json) (`2023-09-12T17:15:17.057`) -* [CVE-2023-38143](CVE-2023/CVE-2023-381xx/CVE-2023-38143.json) (`2023-09-12T17:15:17.367`) -* [CVE-2023-38144](CVE-2023/CVE-2023-381xx/CVE-2023-38144.json) (`2023-09-12T17:15:17.647`) -* [CVE-2023-38146](CVE-2023/CVE-2023-381xx/CVE-2023-38146.json) (`2023-09-12T17:15:17.807`) -* [CVE-2023-38147](CVE-2023/CVE-2023-381xx/CVE-2023-38147.json) (`2023-09-12T17:15:18.130`) -* [CVE-2023-38148](CVE-2023/CVE-2023-381xx/CVE-2023-38148.json) (`2023-09-12T17:15:18.387`) -* [CVE-2023-38149](CVE-2023/CVE-2023-381xx/CVE-2023-38149.json) (`2023-09-12T17:15:18.467`) -* [CVE-2023-38150](CVE-2023/CVE-2023-381xx/CVE-2023-38150.json) (`2023-09-12T17:15:18.557`) -* [CVE-2023-38152](CVE-2023/CVE-2023-381xx/CVE-2023-38152.json) (`2023-09-12T17:15:18.910`) -* [CVE-2023-38155](CVE-2023/CVE-2023-381xx/CVE-2023-38155.json) (`2023-09-12T17:15:19.527`) -* [CVE-2023-38156](CVE-2023/CVE-2023-381xx/CVE-2023-38156.json) (`2023-09-12T17:15:21.123`) -* [CVE-2023-38160](CVE-2023/CVE-2023-381xx/CVE-2023-38160.json) (`2023-09-12T17:15:21.850`) -* [CVE-2023-38161](CVE-2023/CVE-2023-381xx/CVE-2023-38161.json) (`2023-09-12T17:15:22.850`) -* [CVE-2023-38162](CVE-2023/CVE-2023-381xx/CVE-2023-38162.json) (`2023-09-12T17:15:23.567`) -* [CVE-2023-38163](CVE-2023/CVE-2023-381xx/CVE-2023-38163.json) (`2023-09-12T17:15:23.840`) -* [CVE-2023-38164](CVE-2023/CVE-2023-381xx/CVE-2023-38164.json) (`2023-09-12T17:15:24.080`) -* [CVE-2023-41764](CVE-2023/CVE-2023-417xx/CVE-2023-41764.json) (`2023-09-12T17:15:24.247`) +* [CVE-2023-21521](CVE-2023/CVE-2023-215xx/CVE-2023-21521.json) (`2023-09-12T19:15:36.033`) +* [CVE-2023-21522](CVE-2023/CVE-2023-215xx/CVE-2023-21522.json) (`2023-09-12T19:15:36.153`) +* [CVE-2023-30962](CVE-2023/CVE-2023-309xx/CVE-2023-30962.json) (`2023-09-12T19:15:36.237`) +* [CVE-2023-4501](CVE-2023/CVE-2023-45xx/CVE-2023-4501.json) (`2023-09-12T19:15:36.333`) ### CVEs modified in the last Commit -Recently modified CVEs: `10` +Recently modified CVEs: `89` -* [CVE-2020-22916](CVE-2020/CVE-2020-229xx/CVE-2020-22916.json) (`2023-09-12T16:15:07.583`) -* [CVE-2020-0569](CVE-2020/CVE-2020-05xx/CVE-2020-0569.json) (`2023-09-12T17:15:07.987`) -* [CVE-2023-36191](CVE-2023/CVE-2023-361xx/CVE-2023-36191.json) (`2023-09-12T16:15:10.377`) -* [CVE-2023-38200](CVE-2023/CVE-2023-382xx/CVE-2023-38200.json) (`2023-09-12T16:15:10.523`) -* [CVE-2023-38201](CVE-2023/CVE-2023-382xx/CVE-2023-38201.json) (`2023-09-12T16:15:10.813`) -* [CVE-2023-4004](CVE-2023/CVE-2023-40xx/CVE-2023-4004.json) (`2023-09-12T16:15:11.187`) -* [CVE-2023-4147](CVE-2023/CVE-2023-41xx/CVE-2023-4147.json) (`2023-09-12T16:15:11.467`) -* [CVE-2023-4279](CVE-2023/CVE-2023-42xx/CVE-2023-4279.json) (`2023-09-12T16:34:56.927`) -* [CVE-2023-4843](CVE-2023/CVE-2023-48xx/CVE-2023-4843.json) (`2023-09-12T17:46:21.607`) -* [CVE-2023-28010](CVE-2023/CVE-2023-280xx/CVE-2023-28010.json) (`2023-09-12T17:59:17.887`) +* [CVE-2023-38140](CVE-2023/CVE-2023-381xx/CVE-2023-38140.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38141](CVE-2023/CVE-2023-381xx/CVE-2023-38141.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38142](CVE-2023/CVE-2023-381xx/CVE-2023-38142.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38143](CVE-2023/CVE-2023-381xx/CVE-2023-38143.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38144](CVE-2023/CVE-2023-381xx/CVE-2023-38144.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38146](CVE-2023/CVE-2023-381xx/CVE-2023-38146.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38147](CVE-2023/CVE-2023-381xx/CVE-2023-38147.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38148](CVE-2023/CVE-2023-381xx/CVE-2023-38148.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38149](CVE-2023/CVE-2023-381xx/CVE-2023-38149.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38150](CVE-2023/CVE-2023-381xx/CVE-2023-38150.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38152](CVE-2023/CVE-2023-381xx/CVE-2023-38152.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38155](CVE-2023/CVE-2023-381xx/CVE-2023-38155.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38156](CVE-2023/CVE-2023-381xx/CVE-2023-38156.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38160](CVE-2023/CVE-2023-381xx/CVE-2023-38160.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38161](CVE-2023/CVE-2023-381xx/CVE-2023-38161.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38162](CVE-2023/CVE-2023-381xx/CVE-2023-38162.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38163](CVE-2023/CVE-2023-381xx/CVE-2023-38163.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-38164](CVE-2023/CVE-2023-381xx/CVE-2023-38164.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-41764](CVE-2023/CVE-2023-417xx/CVE-2023-41764.json) (`2023-09-12T19:38:09.050`) +* [CVE-2023-34758](CVE-2023/CVE-2023-347xx/CVE-2023-34758.json) (`2023-09-12T19:39:31.640`) +* [CVE-2023-2598](CVE-2023/CVE-2023-25xx/CVE-2023-2598.json) (`2023-09-12T19:41:14.247`) +* [CVE-2023-39164](CVE-2023/CVE-2023-391xx/CVE-2023-39164.json) (`2023-09-12T19:42:29.390`) +* [CVE-2023-28560](CVE-2023/CVE-2023-285xx/CVE-2023-28560.json) (`2023-09-12T19:46:13.190`) +* [CVE-2023-32004](CVE-2023/CVE-2023-320xx/CVE-2023-32004.json) (`2023-09-12T19:54:07.643`) +* [CVE-2023-40942](CVE-2023/CVE-2023-409xx/CVE-2023-40942.json) (`2023-09-12T19:55:13.077`) ## Download and Usage