diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4725.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4725.json index 57e8dcb5bf2..8db4df228ea 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4725.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4725.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4725", "sourceIdentifier": "contact@wpscan.com", "published": "2023-10-16T20:15:16.170", - "lastModified": "2024-11-21T08:35:50.207", + "lastModified": "2025-04-23T13:15:55.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51312.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51312.json index 0e7965f83d6..bd614cf1c88 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51312.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51312.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51312", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T15:15:12.293", - "lastModified": "2025-02-20T18:15:23.293", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-23T13:46:26.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,48 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpjabbers:restaurant_booking_system:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "11956F41-0164-4C1D-88E0-60ED8EEEE8B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/176493", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://packetstorm.news/files/id/176493", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "VDB Entry", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51313.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51313.json index 0b698fe6259..28213b5c660 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51313.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51313.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51313", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T15:15:12.437", - "lastModified": "2025-02-21T18:15:15.350", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-23T13:39:30.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpjabbers:restaurant_booking_system:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "11956F41-0164-4C1D-88E0-60ED8EEEE8B2" + } + ] + } + ] + } + ], "references": [ { "url": "http://packetstormsecurity.com/files/176498/PHPJabbers-Restaurant-Booking-System-3.0-CSV-Injection.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "VDB Entry", + "Third Party Advisory" + ] }, { "url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12133.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12133.json index 4c624455f40..68ede04075e 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12133.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12133.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12133", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-10T16:15:37.260", - "lastModified": "2025-02-21T13:15:10.430", + "lastModified": "2025-04-23T12:15:15.010", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:4049", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-12133", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20039.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20039.json index cadc62c3e50..0c1fe2dc08f 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20039.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20039.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20039", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:07.780", - "lastModified": "2024-11-21T08:51:52.523", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:48:41.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,439 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4B6AFD8-6CBA-4A1D-B38F-A9ABFEB6EFC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12318A0A-16CD-48A5-98A4-373070734642" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6528FA05-C8B7-498B-93BE-0BEFED28C1FB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt3967:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F7108A7-4925-45DF-8705-04F147DB5CF2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99B87E31-AC92-445B-94B8-33DBF72EC11C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2EABFE5-4B6F-446C-9DE7-008D47C09ED7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "160C2DDD-6CA5-4E4F-B885-C8AAA7D1D942" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0002C537-4268-43CA-B349-BC14F1F0313C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE80B083-D5A3-418C-9655-C79C9DECB4C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3367BA13-9C4D-4CCF-8E71-397F33CFF773" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B43D63CF-FF77-41D8-BA4B-F8BDF88830BA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA1BE913-70AE-49FE-99E9-E996165DF79D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2C8F9C2-6471-4498-B089-2F40D2483487" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E208C7B7-7BF6-4E56-B61C-0198B08DC8B3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14DD4149-ACBE-47B8-B52E-7CE8EECA3615" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7122918-8C44-4F24-82E4-B8448247FC83" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", + "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6986:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F419FE2-2D6D-48EE-9B6C-E88AC5D44186" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6986d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68AA1CF7-F1CB-44A0-980E-DB32D9E379B9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*", + "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20040.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20040.json index cf400598c96..c283ba0c616 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20040.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20040.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20040", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:07.847", - "lastModified": "2025-03-13T19:15:41.530", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:48:30.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,344 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*", + "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:4.19:-:*:*:*:*:*:*", + "matchCriteriaId": "CFDAD450-8799-4C2D-80CE-2AA45DEC35CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*", + "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", + "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91DEA745-47A8-43F1-A1B2-F53F651A99EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AB22996-9C22-4B6C-9E94-E4C055D16335" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD5AA441-5381-4179-89EB-1642120F72B4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt7920:-:*:*:*:*:*:*:*", + "matchCriteriaId": "140DAC08-96E9-47D3-BC2E-65E999DCFD50" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt7922:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA2A6813-7138-441E-A9E4-FF62FCBD797A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt7925:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27CFC9DF-2F4C-469A-8A19-A260B1134CFE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05525018-AFE0-415C-A71C-A77922C7D637" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*", + "matchCriteriaId": "490CD97B-021F-4350-AEE7-A2FA866D5889" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40A9E917-4B34-403F-B512-09EEBEA46811" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6069CD03-6AB1-4A06-88CF-EFBDEA84CDE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*", + "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20041.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20041.json index d8b4318ad8a..774cec33c3c 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20041.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20041.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20041", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:07.897", - "lastModified": "2024-11-21T08:51:52.830", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:48:21.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,129 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20042.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20042.json index 68e1d091388..f393c340e30 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20042.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20042.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20042", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:07.953", - "lastModified": "2024-11-21T08:51:53.027", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:48:16.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,264 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20043.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20043.json index ad3d30a9481..49f530aebee 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20043.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20043.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20043", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.007", - "lastModified": "2024-11-21T08:51:53.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:48:11.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,264 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20044.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20044.json index b4d0568d788..0c94584ff2c 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20044.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20044.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20044", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.053", - "lastModified": "2024-11-21T08:51:53.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:48:08.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,264 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20045.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20045.json index 9e5a031facf..83f54085762 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20045.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20045.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20045", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.103", - "lastModified": "2025-03-28T20:15:20.773", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:48:02.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,219 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20046.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20046.json index 907bda00241..c8116b9d78a 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20046.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20046.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20046", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.177", - "lastModified": "2024-11-21T08:51:53.757", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:47:56.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,149 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20047.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20047.json index 6c8aade8378..e2d5760a16b 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20047.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20047.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20047", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.227", - "lastModified": "2024-11-21T08:51:53.960", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:47:51.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,134 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20048.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20048.json index e198df4321a..e8230329909 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20048.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20048.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20048", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.280", - "lastModified": "2024-11-21T08:51:54.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:47:45.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,239 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20049.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20049.json index dda7ff4e05b..319697a7c14 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20049.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20049.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20049", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.337", - "lastModified": "2025-03-13T17:15:25.873", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:47:38.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,284 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*", + "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*", + "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", + "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20050.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20050.json index 61288b80691..8db5323d668 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20050.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20050.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20050", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.383", - "lastModified": "2024-11-21T08:51:54.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:47:32.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,289 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*", + "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*", + "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", + "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20051.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20051.json index 0292fadcfad..c3030c25aa6 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20051.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20051.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20051", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.437", - "lastModified": "2024-11-21T08:51:54.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:47:26.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,301 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*", + "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*", + "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", + "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20052.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20052.json index bd7b97ac2ce..af642945920 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20052.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20052.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20052", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.490", - "lastModified": "2024-11-21T08:51:54.807", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:47:16.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,301 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*", + "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*", + "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", + "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20053.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20053.json index f716cb755d7..8f351403f48 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20053.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20053.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20053", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.537", - "lastModified": "2024-11-21T08:51:54.983", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:47:12.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,289 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*", + "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*", + "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", + "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20054.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20054.json index 6e70e43db13..349d39e3377 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20054.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20054.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20054", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.590", - "lastModified": "2024-11-21T08:51:55.183", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:47:04.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,309 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*", + "matchCriteriaId": "397C75CA-D217-4617-B8B1-80F74CFB04CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*", + "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*", + "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", + "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CF88096-5CBD-4A4B-8F47-33D38985956F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*", + "matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20055.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20055.json index a98ef59f1d0..ff70c8025a5 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20055.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20055.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20055", "sourceIdentifier": "security@mediatek.com", "published": "2024-04-01T03:15:08.640", - "lastModified": "2025-03-26T20:15:18.523", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-23T13:46:52.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,139 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mediatek:iot_yocto:23.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FC6EF24A-37C2-4BFD-BF05-79089E74910C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26573298-76BC-49FE-8D99-CF03ED01B185" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78D4E9E1-B044-41EC-BE98-22DC0E5E9010" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8871:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1F80793-01B7-403A-A5F4-031F82FAC77A" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://corp.mediatek.com/product-security-bulletin/April-2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46494.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46494.json index 6e437d6dbcc..89b9ed8d218 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46494.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46494.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46494", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T20:15:19.950", - "lastModified": "2025-04-08T20:15:19.813", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-23T12:33:52.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:typecho:typecho:1.2.1:-:*:*:*:*:*:*", + "matchCriteriaId": "0BE056CC-41EF-4C70-9B90-6C654B543A40" + } + ] + } + ] + } + ], "references": [ { "url": "https://h40vv3n.github.io/2024/09/05/typecho-xss/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://h40vv3n.github.io/2024/09/05/typecho-xss/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8176.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8176.json index 5b0f9123c3a..be9d93c56a0 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8176.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8176.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8176", "sourceIdentifier": "secalert@redhat.com", "published": "2025-03-14T09:15:14.157", - "lastModified": "2025-04-15T17:15:37.603", + "lastModified": "2025-04-23T12:15:15.957", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -64,6 +64,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:3913", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:4048", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-8176", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2703.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2703.json new file mode 100644 index 00000000000..b974745cd80 --- /dev/null +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2703.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-2703", + "sourceIdentifier": "security@grafana.com", + "published": "2025-04-23T12:15:16.103", + "lastModified": "2025-04-23T12:15:16.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The built-in XY Chart plugin is vulnerable to a DOM XSS vulnerability. \n\nA user with Editor permissions is able to modify such a panel in order to make it execute arbitrary JavaScript." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@grafana.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@grafana.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://grafana.com/security/security-advisories/cve-2025-2703", + "source": "security@grafana.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29457.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29457.json index 83956d9032b..cdb6c518524 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29457.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29457.json @@ -2,13 +2,24 @@ "id": "CVE-2025-29457", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-17T22:15:15.183", - "lastModified": "2025-04-21T14:23:45.950", - "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "lastModified": "2025-04-23T13:15:56.817", + "vulnStatus": "Undergoing Analysis", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "An issue in MyBB 1.8.38 allows a remote attacker to obtain sensitive information via the Import a Theme function." + "value": "An issue in MyBB 1.8.38 allows a remote attacker to obtain sensitive information via the Import a Theme function. NOTE: the Supplier disputes this because of the allowed actions of Board administrators and because of SSRF mitigation." + }, + { + "lang": "es", + "value": "Un problema en MyBB 1.8.38 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n Importar un tema." } ], "metrics": { @@ -48,6 +59,10 @@ } ], "references": [ + { + "url": "https://docs.mybb.com/1.8/administration/security/protection/#limit-access-to-private-hosts-and-ip-addresses", + "source": "cve@mitre.org" + }, { "url": "https://www.yuque.com/morysummer/vx41bz/vro4dvxzuiwlg6uv", "source": "cve@mitre.org" diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29458.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29458.json index 0abb9eae814..4759783135c 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29458.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29458.json @@ -2,13 +2,24 @@ "id": "CVE-2025-29458", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-17T22:15:15.290", - "lastModified": "2025-04-21T14:23:45.950", - "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "lastModified": "2025-04-23T13:15:57.043", + "vulnStatus": "Undergoing Analysis", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "An issue in MyBB 1.8.38 allows a remote attacker to obtain sensitive information via the Change Avatar function." + "value": "An issue in MyBB 1.8.38 allows a remote attacker to obtain sensitive information via the Change Avatar function. NOTE: the Supplier disputes this because of the allowed actions of Board administrators and because of SSRF mitigation." + }, + { + "lang": "es", + "value": "Un problema en MyBB 1.8.38 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n Cambiar avatar." } ], "metrics": { @@ -48,6 +59,10 @@ } ], "references": [ + { + "url": "https://docs.mybb.com/1.8/administration/security/protection/#limit-access-to-private-hosts-and-ip-addresses", + "source": "cve@mitre.org" + }, { "url": "https://www.yuque.com/morysummer/vx41bz/qu7zyyxr84qno64e", "source": "cve@mitre.org" diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29459.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29459.json index f66b5865e4d..8d00a57045b 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29459.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29459.json @@ -2,13 +2,24 @@ "id": "CVE-2025-29459", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-17T22:15:15.387", - "lastModified": "2025-04-21T14:23:45.950", - "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "lastModified": "2025-04-23T13:15:57.230", + "vulnStatus": "Undergoing Analysis", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "An issue in MyBB 1.8.38 allows a remote attacker to obtain sensitive information via the Mail function." + "value": "An issue in MyBB 1.8.38 allows a remote attacker to obtain sensitive information via the Mail function. NOTE: the Supplier disputes this because of the allowed actions of Board administrators and because of SSRF mitigation." + }, + { + "lang": "es", + "value": "Un problema en MyBB 1.8.38 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n Correo." } ], "metrics": { @@ -48,6 +59,10 @@ } ], "references": [ + { + "url": "https://docs.mybb.com/1.8/administration/security/protection/#limit-access-to-private-hosts-and-ip-addresses", + "source": "cve@mitre.org" + }, { "url": "https://www.yuque.com/morysummer/vx41bz/ggnmg5nnu635kvrc", "source": "cve@mitre.org" diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29460.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29460.json index d528d00df9b..6ec8e7f66d9 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29460.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29460.json @@ -2,13 +2,24 @@ "id": "CVE-2025-29460", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-17T22:15:15.493", - "lastModified": "2025-04-21T14:23:45.950", - "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "lastModified": "2025-04-23T13:15:57.423", + "vulnStatus": "Undergoing Analysis", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "An issue in MyBB 1.8.38 allows a remote attacker to obtain sensitive information via the Add Mycode function." + "value": "An issue in MyBB 1.8.38 allows a remote attacker to obtain sensitive information via the Add Mycode function. NOTE: the Supplier disputes this because of the allowed actions of Board administrators and because of SSRF mitigation." + }, + { + "lang": "es", + "value": "Un problema en MyBB 1.8.38 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n Add Mycode." } ], "metrics": { @@ -48,6 +59,10 @@ } ], "references": [ + { + "url": "https://docs.mybb.com/1.8/administration/security/protection/#limit-access-to-private-hosts-and-ip-addresses", + "source": "cve@mitre.org" + }, { "url": "https://www.yuque.com/morysummer/vx41bz/fgg059stiog457ch", "source": "cve@mitre.org" diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3268.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3268.json index 1a18c14c981..b4df11cbab0 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3268.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3268.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3268", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-04T21:15:51.557", - "lastModified": "2025-04-07T16:15:26.430", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-23T13:11:34.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +138,74 @@ "value": "CWE-287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qinguoyi:tinywebserver:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "159604E0-C0B2-493B-9C3B-0C2A1EBDBE85" + } + ] + } + ] } ], "references": [ { "url": "https://magnificent-dill-351.notion.site/Improper-Authentication-in-TinyWebServer-1-0-1c9c693918ed80cfa0f5db1a1d03c5e7", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.303340", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303340", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.549229", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://magnificent-dill-351.notion.site/Improper-Authentication-in-TinyWebServer-1-0-1c9c693918ed80cfa0f5db1a1d03c5e7", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3380.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3380.json index 7b067efef0e..68443f3292c 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3380.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3380.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3380", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T19:15:57.747", - "lastModified": "2025-04-08T18:13:53.347", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-23T13:04:54.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pcman:ftp_server:2.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "FFCD8474-574E-46D1-A98D-394E7543FBD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://fitoxs.com/exploit/exploit-c926c69a41d2fce207cf3a3b789b7a79.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.303626", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303626", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.552342", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://fitoxs.com/exploit/exploit-c926c69a41d2fce207cf3a3b789b7a79.txt", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 2996baf4488..304b3b35ef1 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-23T12:00:21.480847+00:00 +2025-04-23T14:00:19.478902+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-23T11:15:47.327000+00:00 +2025-04-23T13:48:41.747000+00:00 ``` ### Last Data Feed Release @@ -33,29 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -291145 +291146 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `1` -- [CVE-2024-10306](CVE-2024/CVE-2024-103xx/CVE-2024-10306.json) (`2025-04-23T10:15:14.330`) -- [CVE-2025-1054](CVE-2025/CVE-2025-10xx/CVE-2025-1054.json) (`2025-04-23T10:15:15.280`) -- [CVE-2025-42600](CVE-2025/CVE-2025-426xx/CVE-2025-42600.json) (`2025-04-23T11:15:46.603`) -- [CVE-2025-42601](CVE-2025/CVE-2025-426xx/CVE-2025-42601.json) (`2025-04-23T11:15:46.797`) -- [CVE-2025-42602](CVE-2025/CVE-2025-426xx/CVE-2025-42602.json) (`2025-04-23T11:15:46.933`) -- [CVE-2025-42603](CVE-2025/CVE-2025-426xx/CVE-2025-42603.json) (`2025-04-23T11:15:47.063`) -- [CVE-2025-42604](CVE-2025/CVE-2025-426xx/CVE-2025-42604.json) (`2025-04-23T11:15:47.190`) -- [CVE-2025-42605](CVE-2025/CVE-2025-426xx/CVE-2025-42605.json) (`2025-04-23T11:15:47.327`) +- [CVE-2025-2703](CVE-2025/CVE-2025-27xx/CVE-2025-2703.json) (`2025-04-23T12:15:16.103`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `29` -- [CVE-2024-12243](CVE-2024/CVE-2024-122xx/CVE-2024-12243.json) (`2025-04-23T11:15:45.773`) -- [CVE-2025-3530](CVE-2025/CVE-2025-35xx/CVE-2025-3530.json) (`2025-04-23T08:15:14.723`) +- [CVE-2024-20039](CVE-2024/CVE-2024-200xx/CVE-2024-20039.json) (`2025-04-23T13:48:41.747`) +- [CVE-2024-20040](CVE-2024/CVE-2024-200xx/CVE-2024-20040.json) (`2025-04-23T13:48:30.197`) +- [CVE-2024-20041](CVE-2024/CVE-2024-200xx/CVE-2024-20041.json) (`2025-04-23T13:48:21.353`) +- [CVE-2024-20042](CVE-2024/CVE-2024-200xx/CVE-2024-20042.json) (`2025-04-23T13:48:16.787`) +- [CVE-2024-20043](CVE-2024/CVE-2024-200xx/CVE-2024-20043.json) (`2025-04-23T13:48:11.947`) +- [CVE-2024-20044](CVE-2024/CVE-2024-200xx/CVE-2024-20044.json) (`2025-04-23T13:48:08.500`) +- [CVE-2024-20045](CVE-2024/CVE-2024-200xx/CVE-2024-20045.json) (`2025-04-23T13:48:02.027`) +- [CVE-2024-20046](CVE-2024/CVE-2024-200xx/CVE-2024-20046.json) (`2025-04-23T13:47:56.393`) +- [CVE-2024-20047](CVE-2024/CVE-2024-200xx/CVE-2024-20047.json) (`2025-04-23T13:47:51.423`) +- [CVE-2024-20048](CVE-2024/CVE-2024-200xx/CVE-2024-20048.json) (`2025-04-23T13:47:45.370`) +- [CVE-2024-20049](CVE-2024/CVE-2024-200xx/CVE-2024-20049.json) (`2025-04-23T13:47:38.603`) +- [CVE-2024-20050](CVE-2024/CVE-2024-200xx/CVE-2024-20050.json) (`2025-04-23T13:47:32.820`) +- [CVE-2024-20051](CVE-2024/CVE-2024-200xx/CVE-2024-20051.json) (`2025-04-23T13:47:26.270`) +- [CVE-2024-20052](CVE-2024/CVE-2024-200xx/CVE-2024-20052.json) (`2025-04-23T13:47:16.587`) +- [CVE-2024-20053](CVE-2024/CVE-2024-200xx/CVE-2024-20053.json) (`2025-04-23T13:47:12.910`) +- [CVE-2024-20054](CVE-2024/CVE-2024-200xx/CVE-2024-20054.json) (`2025-04-23T13:47:04.043`) +- [CVE-2024-20055](CVE-2024/CVE-2024-200xx/CVE-2024-20055.json) (`2025-04-23T13:46:52.570`) +- [CVE-2024-46494](CVE-2024/CVE-2024-464xx/CVE-2024-46494.json) (`2025-04-23T12:33:52.857`) +- [CVE-2024-8176](CVE-2024/CVE-2024-81xx/CVE-2024-8176.json) (`2025-04-23T12:15:15.957`) +- [CVE-2025-29457](CVE-2025/CVE-2025-294xx/CVE-2025-29457.json) (`2025-04-23T13:15:56.817`) +- [CVE-2025-29458](CVE-2025/CVE-2025-294xx/CVE-2025-29458.json) (`2025-04-23T13:15:57.043`) +- [CVE-2025-29459](CVE-2025/CVE-2025-294xx/CVE-2025-29459.json) (`2025-04-23T13:15:57.230`) +- [CVE-2025-29460](CVE-2025/CVE-2025-294xx/CVE-2025-29460.json) (`2025-04-23T13:15:57.423`) +- [CVE-2025-3268](CVE-2025/CVE-2025-32xx/CVE-2025-3268.json) (`2025-04-23T13:11:34.207`) +- [CVE-2025-3380](CVE-2025/CVE-2025-33xx/CVE-2025-3380.json) (`2025-04-23T13:04:54.297`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5687968ff1a..c224c93edc6 100644 --- a/_state.csv +++ b/_state.csv @@ -237401,7 +237401,7 @@ CVE-2023-47246,0,0,9ee048611e335d6ef5ca354dafc13239e090cf221f5c631602637916b0565 CVE-2023-47247,0,0,6c0bd6cea993b04ace26b90d46ca9971934088213c7deda52a3ee268f6eb9ab3,2024-11-21T08:30:02.280000 CVE-2023-47248,0,0,84c030bb9f5b7a4651b2481fbe3c96af8930c8539a17b7759ebe107ca60bcf1d,2025-02-13T18:15:38.513000 CVE-2023-47249,0,0,2c7a90e1d2da420678c292eab4af2a2635e465b566848812fbd6cbfede631d2b,2024-11-21T08:30:02.607000 -CVE-2023-4725,0,0,3d64f30b10ba9766e29cc8f995134b647fbd4ec264cce0293ac2236288f2b5d5,2024-11-21T08:35:50.207000 +CVE-2023-4725,0,1,ba58991f977d32dd42961ad81cd7fca967f05df588e5b184aca9a65209e226a4,2025-04-23T13:15:55.780000 CVE-2023-47250,0,0,1a55b31caf761ef75bbbd4a7abf669d98d16d9508db781f1b33f9e3018e980d0,2024-11-21T08:30:02.823000 CVE-2023-47251,0,0,e7b38f3ec04239e001075391d348d5e78bc58e0ae8c78f04da66c59c999f8954,2024-11-21T08:30:03.013000 CVE-2023-47252,0,0,384ddc31f541d0676ed2e10c09eec115a2ca226aff1326f7bbe8f4ec2e25e794,2024-11-21T08:30:03.193000 @@ -240218,8 +240218,8 @@ CVE-2023-51309,0,0,b47eb93f85286a38e6b227361b9d56fdd44ae0fb9157dcb2973d013099f4d CVE-2023-5131,0,0,ea7fb93c4dbd8bd2f769e40008c92349338343ffec9aef4cd684c52a4f03daea,2024-11-21T08:41:07.410000 CVE-2023-51310,0,0,33094e94596169256cf78e143fc2047b72cf400b0a36e4a36496081771d68bba,2025-02-20T18:15:23.090000 CVE-2023-51311,0,0,d4e651f51e8aba72b98d1e38d35db64a4f1cd04060a101aac7ddce6778795b26,2025-02-24T18:15:17.150000 -CVE-2023-51312,0,0,2b77c2f97fe8ce0d02c6c4bb3045b7901d79294df524f0fcd3b936d305b849fb,2025-02-20T18:15:23.293000 -CVE-2023-51313,0,0,b4228879cadc5b6a30c0bb739048501435f416e93eb381e021873a3470a10c3f,2025-02-21T18:15:15.350000 +CVE-2023-51312,0,1,a95afc656339588af83e310f7eb423ad1bff92de44c4c48101eadda88b5363e0,2025-04-23T13:46:26.907000 +CVE-2023-51313,0,1,ea694852154dd349e3b8543d7f2776c517880783845d0cc4fd1ff6ff1a888d65,2025-04-23T13:39:30.370000 CVE-2023-51314,0,0,652fe6a615306a34a78a51d13f8f214d11e73d2aa8cc674c7744fa37c4403189,2025-02-21T18:15:15.567000 CVE-2023-51315,0,0,5712be8071c48b48083e116e132f397e5501797e2b823f7904b4fd75e4afd91c,2025-02-20T18:15:23.490000 CVE-2023-51316,0,0,29ccbb9d8e733728443a6f153411d31509b2e782f8c6a2b7dca86dc839d7a24e,2025-04-22T14:15:36.210000 @@ -244807,7 +244807,7 @@ CVE-2024-1030,0,0,6d2d82ef3072f02e7c34d7489d5c3e0649bc9fdc5d37c6ed18885f5f961ee1 CVE-2024-10300,0,0,71f89392a82bac9e3a1118d602fedad5aa8e35f49fa5cc5e5782fb8c6482f21b,2024-10-25T18:49:01.953000 CVE-2024-10301,0,0,3d2ee5c748542f3efcde40d90c311550627d3156c0575f82911af7d8dec82c11,2024-10-25T18:47:54.033000 CVE-2024-10305,0,0,c796e0a9a1f8c346431dc8391644400d6ff87d94b0f13883aeae274109208b98,2025-02-11T02:15:33.200000 -CVE-2024-10306,1,1,792b0dd34ad4909dbace4af8af5ba2c73aece39fed2b4ea5974067d8c70c4570,2025-04-23T10:15:14.330000 +CVE-2024-10306,0,0,792b0dd34ad4909dbace4af8af5ba2c73aece39fed2b4ea5974067d8c70c4570,2025-04-23T10:15:14.330000 CVE-2024-10307,0,0,b3c6596e9363272e01afbca3eda91cdf366d6168437cf679755595a795028a90,2025-03-28T18:11:40.180000 CVE-2024-10308,0,0,7d25344eaafedd87dec065a0c2fdf72a371424d31caf12f177490522cd87b5ec,2025-01-09T20:30:43.060000 CVE-2024-10309,0,0,c3b06cfa7dc37203816d2b3718e47926115a5ae85aab2018d71ee2aed22785cb,2025-01-30T17:15:17.370000 @@ -246664,7 +246664,7 @@ CVE-2024-1213,0,0,46a1c578e51af4f5ea0de6f43fa1aef1a4b74eefd9efa4b8f5743377924d31 CVE-2024-12130,0,0,f13cb67c00f6dcc27d0c31ba4dea31c8dabc6f66eb953b7214a560c5a851f67a,2024-12-17T15:52:01.670000 CVE-2024-12131,0,0,dbf0aa17931777a7d2a18f8d74d983fb90b7cc72d860577b6997f11baa1caf8d,2025-02-05T19:34:09.820000 CVE-2024-12132,0,0,b06e93c25499732ca815413e2d46627c97d1199e136eda86bfe61d37a4878c0b,2025-02-05T19:37:43.237000 -CVE-2024-12133,0,0,6bf377b889cff4de6171d2a9027b1a17bce7f2dd91b7456e427087f02e89773b,2025-02-21T13:15:10.430000 +CVE-2024-12133,0,1,9b8ef2d4b4c83c296c5a9f45e4eaea628c3ae104cf79b3208ed31ed118dcdcdf,2025-04-23T12:15:15.010000 CVE-2024-12136,0,0,affc78033419823091fd426e817f93b40fcd60130b3d16f47491668ff8a74b62,2025-03-19T09:15:12.710000 CVE-2024-12137,0,0,3866c73264ee04bbb6164db23f168e7ffa40b18dd0c34a109d019afb6b1c2412,2025-03-19T09:15:14.090000 CVE-2024-12138,0,0,da6ee7fbee0e9075f414529b46a16ebad54f1168ad899da7c1771d5519a5d924,2024-12-04T14:15:19.413000 @@ -246772,7 +246772,7 @@ CVE-2024-12239,0,0,2dd2f60a878bde8fc4082e44b55290b6330ca8ddb5c2322a79fe1567e7103 CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000 CVE-2024-12240,0,0,6672995b52813f98387098ac3b3013676e82d4cc5e92b1023b4a144f1eea1a77,2025-01-14T11:15:15.137000 CVE-2024-12242,0,0,2f55c665eef830ff2620035cbcfe4292d890dc745ab209f9df7f0382ca44ae3c,2025-02-11T02:15:33.653000 -CVE-2024-12243,0,1,21abb63f551c04214ac9f57da8e02697b40abe367a9fc617ebe76745884217b6,2025-04-23T11:15:45.773000 +CVE-2024-12243,0,0,21abb63f551c04214ac9f57da8e02697b40abe367a9fc617ebe76745884217b6,2025-04-23T11:15:45.773000 CVE-2024-12245,0,0,31276812dc8de5bfdb7bab3cdab8b1c866149ec90ff0dd7db23266bd4fc80d08,2025-03-14T18:15:27.530000 CVE-2024-12246,0,0,25e368b7b625668da07b20dc2399fc14978a413e8f5dc9b92a1c223e61cf9256,2025-02-11T02:15:33.710000 CVE-2024-12247,0,0,ad117a7da5529073984608210b9ebf0c8357341e47d0f7a47c01f4275cf4ac25,2024-12-05T16:15:25.243000 @@ -249051,25 +249051,25 @@ CVE-2024-20034,0,0,440a5d880e72a4a130a2740b4688e06f48b4dddb4ef688a3f6304440f8fc7 CVE-2024-20036,0,0,b87b27bba4cfe2acf7835a2bf8987834be536d058521416978c151b2858d9442,2025-04-22T20:23:27.683000 CVE-2024-20037,0,0,e7b178c549d4cd86a4202b75c845a2c22d28461d11c1ff1ab238bfa1193db799,2025-04-22T20:23:37.533000 CVE-2024-20038,0,0,320e20128ab827942c4e08552672d6bf5df0526d990fa2c844af70e48bedd346,2025-04-22T20:23:48.507000 -CVE-2024-20039,0,0,2b0fdb71275f49aeadf986dee4d38a4bf4c596bec19be53f8dd6bb9e1145f672,2024-11-21T08:51:52.523000 +CVE-2024-20039,0,1,0dc6121a9e0c147d61e1f2a20847cf631db72f55e999ea9f64493b664f3f6807,2025-04-23T13:48:41.747000 CVE-2024-2004,0,0,2d2f51ef4843b41303e56f625b5a4f303946c3ef3964ff0e65dbf64107ba9890,2024-11-21T09:08:47.413000 -CVE-2024-20040,0,0,2b0df4102159dc806669dffea9653d232da676751cf47e5c76e16ac064668c53,2025-03-13T19:15:41.530000 -CVE-2024-20041,0,0,38361be82aea4283181b27a5c6f3b007442ad4ccc46f7c073fd985e0f33ad859,2024-11-21T08:51:52.830000 -CVE-2024-20042,0,0,58e28b3e8d45ded3d81cfa24f57c4385de5cb9f9f96a54a23d8f71cdff5ba0a2,2024-11-21T08:51:53.027000 -CVE-2024-20043,0,0,a5c7cb28236b70161056c6715e2042a72d48df3b922ae17232e937ffbbcedded,2024-11-21T08:51:53.237000 -CVE-2024-20044,0,0,18f7d36294d6281b36c03b6ea96d43beeebe0ec2891fb4fac0201b211be5a914,2024-11-21T08:51:53.437000 -CVE-2024-20045,0,0,0a3091c125999e49e5c74718e3ba88e2a67de5dc879b6713b0678a2851b838a5,2025-03-28T20:15:20.773000 -CVE-2024-20046,0,0,3b0cb38468dc6ce3f4f783d34648c8b0b74b5ca380d79f4af4e2082d8089e321,2024-11-21T08:51:53.757000 -CVE-2024-20047,0,0,c47752035c532511849b03dd4c5e0abb4ea1e7cb27faa513eb222a38fcc318c5,2024-11-21T08:51:53.960000 -CVE-2024-20048,0,0,535fd04d026c6f8c45119acbdff0eefcaae366754effe78a06af4607e0692f06,2024-11-21T08:51:54.143000 -CVE-2024-20049,0,0,91b688f57d4bdad45ee8b7fdcff21b8f8982a4fdd54ac23580f83ba7ea37a1ae,2025-03-13T17:15:25.873000 +CVE-2024-20040,0,1,9a1c03e4dd72bbef314a16a08eddb46342c65dad836cf13511d3eb9cb2bca932,2025-04-23T13:48:30.197000 +CVE-2024-20041,0,1,9fab8f2f075f62a61adb2c9500a4a393702b7fa8be01897b41792a2ecbe8a9a1,2025-04-23T13:48:21.353000 +CVE-2024-20042,0,1,842f144aadee528fd544b6b6a31b89fec05ea819b5888d9ae627897355ef3721,2025-04-23T13:48:16.787000 +CVE-2024-20043,0,1,769390e18cd458f7cf3f4a38e2da93c89b6175d0c99848e684a03c1d02eba558,2025-04-23T13:48:11.947000 +CVE-2024-20044,0,1,4c08e46af48f6a19ba831e2a1d32b40eb2d8846473616d0156e183933f4917b6,2025-04-23T13:48:08.500000 +CVE-2024-20045,0,1,512047d50ef19ef44aa719bfd8bdac90045d0ee4c36e343f997598d6c161f199,2025-04-23T13:48:02.027000 +CVE-2024-20046,0,1,4448b7a8073c7d61f5754a08b7a8b6718d9cd3f13f739bc0bfeb4776dbb5c565,2025-04-23T13:47:56.393000 +CVE-2024-20047,0,1,ebb30202155e3b8eecec38cb88f66a082125d9bbef72f842133e9977e5c6e364,2025-04-23T13:47:51.423000 +CVE-2024-20048,0,1,fef459f21a37a1f448ce6348ddef1859334a73daa46eface67b0eed9bb18fc10,2025-04-23T13:47:45.370000 +CVE-2024-20049,0,1,516e31cee41a64f855932216ac0b9c44e9e3c6bf4d391bb1e4a8c9f7b8d468e6,2025-04-23T13:47:38.603000 CVE-2024-2005,0,0,0e8b08b245bb0780bd34f1ed3f2804a5abca3a67624fdb058a1c347877f6988f,2025-03-04T14:22:49.413000 -CVE-2024-20050,0,0,27737cea1576189891d35253eeb8bd58c495c56193d77fabca31a2822df9db7f,2024-11-21T08:51:54.443000 -CVE-2024-20051,0,0,effbe7e44198a140c787f3268c0b0d4546b1ca8ce2d16e1ab5ffb6720ac6cf3f,2024-11-21T08:51:54.630000 -CVE-2024-20052,0,0,429cd8ebc968e948252a6903d57a6ffeac603fe9d66ab5e6725a16f8e5a8895d,2024-11-21T08:51:54.807000 -CVE-2024-20053,0,0,b0ee940929e7291238ace26b77e0d158f9e50b3b0daad197f4777ac61e6333f0,2024-11-21T08:51:54.983000 -CVE-2024-20054,0,0,f358b3b9aba60657b905367a8b01f2cd51ff66158e74ab110bac7f9db0201b9f,2024-11-21T08:51:55.183000 -CVE-2024-20055,0,0,569611d1e8df2e39b022c121c3a4e67e237f4ffe9d1d165ffec928b0390aa87b,2025-03-26T20:15:18.523000 +CVE-2024-20050,0,1,6f77cf4d97ef1429fc45c73119f91b74d874eebf01bf1a65d715ae0d086e046e,2025-04-23T13:47:32.820000 +CVE-2024-20051,0,1,d812e737d43f9571d1dcb702c2047c33e79ff00aca03c9551d8e1549e5146e98,2025-04-23T13:47:26.270000 +CVE-2024-20052,0,1,3db04f6688e9ece28c2ce0a6eaecf28447410f4f72e5442dc5ee89a60a5cebfa,2025-04-23T13:47:16.587000 +CVE-2024-20053,0,1,f8f78114632c0791d3f1a6e2259dc542270a5658a476d681c42f69b6f1478a8e,2025-04-23T13:47:12.910000 +CVE-2024-20054,0,1,fd5688cb9a70817a324b49932e89c928f977f7bb2e3930cbf94062f118ec2200,2025-04-23T13:47:04.043000 +CVE-2024-20055,0,1,a2138aec11b14adf47295d1fbf4db275be27b6709e9cb3ea42c8863ab4ab15af,2025-04-23T13:46:52.570000 CVE-2024-20056,0,0,81d428e4d181e8312b32dda0cff6cfde75ef18609600caa3b7da7e981bb2a321,2025-03-13T18:15:36.880000 CVE-2024-20057,0,0,28428ed594c3c65f26540c75fc42e98348efa359e5f2e3e1f30df07de1c620c6,2025-03-27T17:15:53.877000 CVE-2024-20058,0,0,b1aea78d08cecbe8a6797a2eccae67b4216de9f124a4ec0b1bd505c4bb859c46,2024-11-21T08:51:55.767000 @@ -269362,7 +269362,7 @@ CVE-2024-46486,0,0,6000c159ec790985a8f8b0baa816aa79580e9d13b05f3014b35b7b51c8e41 CVE-2024-46488,0,0,56f5fe55fa4ef09d855ee33f04dd341373041abcc8cd41a78f126a1716041dc8,2024-10-02T16:21:36.507000 CVE-2024-46489,0,0,8af935ea59345c18a65a02a5934ad59e5a604855494058e15126d177378cefdd,2024-10-02T16:24:32.300000 CVE-2024-4649,0,0,f64d2b4ba0c6460a9ead3048468022c15a6a01d0faaa5bf3c36ccd0615f06803,2025-02-19T18:03:44.760000 -CVE-2024-46494,0,0,55856f4dd25eb369073b0741c5cbb07b4b6282cf41173fc21c2887a4d5021a8a,2025-04-08T20:15:19.813000 +CVE-2024-46494,0,1,580c72c7059ccc770e62d20d40e491338c7e5346f3a8e8c1cf9313c6ac403c09,2025-04-23T12:33:52.857000 CVE-2024-4650,0,0,a0725088573bca3157246d7fc5e5180f0fb821fadf7f00a64494559769289d48,2025-02-19T18:08:51.490000 CVE-2024-46503,0,0,4f133c90e139e687d3dd9079c4687fb4224dd448ab71bd78013c69a7fcf35624,2024-10-10T14:15:05.183000 CVE-2024-46505,0,0,8a30b2b018a417760478138048dfdc666d3014f90e1bca5af5084411338920d1,2025-01-23T18:15:30.247000 @@ -279678,7 +279678,7 @@ CVE-2024-8172,0,0,5e062d7fa9b382dea93e1f767fffb1fa53a9fae08c970d11918d99fbdd4158 CVE-2024-8173,0,0,79d0a5bcc298ac96a53f7987d1a6d8cd25e9e6d09db6737baa14ffb177e446db,2024-09-05T18:39:00.950000 CVE-2024-8174,0,0,3446999d604a73b64824b7dfc0f9030b87b9bf86620bf485c6700ced4124e5f3,2024-08-27T14:32:08.607000 CVE-2024-8175,0,0,315b5d8c30fa3f596d2b19f9165abc0783338a7797fc6b810b3d2ebf5065b9c7,2024-09-26T13:32:02.803000 -CVE-2024-8176,0,0,5bfad7b7e31142c24d79558117f7e91b877a90051c25e7c4db0b34c43d302f79,2025-04-15T17:15:37.603000 +CVE-2024-8176,0,1,aa96a0bb089a5a709651099f782d65d5f163800c638f3f523148ff873eb68d90,2025-04-23T12:15:15.957000 CVE-2024-8177,0,0,b6b87a35240fa465258bcf1069a2f42ce120e742e643226c45df1f3c07fd30d8,2024-12-13T01:29:28.587000 CVE-2024-8178,0,0,f63bf0f152c4f86c96b3594773688985cacb234931d40b4f2f4b7730cd2e6082,2024-09-06T17:35:20.203000 CVE-2024-8179,0,0,b1b4aece608ad1a17ae7c49798e553f4880b682fdd1e7f65e9fe5b21bed13415,2024-12-12T12:15:27.937000 @@ -282056,7 +282056,7 @@ CVE-2025-1043,0,0,85285f0459384c003ce1a5c887368f71f800dede66c51b6ace529750f1366c CVE-2025-1044,0,0,9f8be6c10874ff2755d0454f22f2307f6446f5aad49de046e6d1d7bccf9d96f4,2025-02-18T21:34:01.863000 CVE-2025-1052,0,0,dd0f54ac7a99856d7d318fe87955632258ed518980dc0996f06ddf7223075097,2025-02-18T21:32:45.863000 CVE-2025-1053,0,0,745fc40219bc37fd7ab7252db87e5d766a3ee14d78f27aa4c9a1b496940a21f8,2025-02-14T04:15:08.903000 -CVE-2025-1054,1,1,4f648087404d5f94f81892b6abae138d8dde37a4c7d2cb9d5fe9cac212e50831,2025-04-23T10:15:15.280000 +CVE-2025-1054,0,0,4f648087404d5f94f81892b6abae138d8dde37a4c7d2cb9d5fe9cac212e50831,2025-04-23T10:15:15.280000 CVE-2025-1056,0,0,761de48b4451bb267d3ace586bde14815dc352bb894b4fb2f8bba30da7179e6d,2025-04-23T06:15:46.573000 CVE-2025-1057,0,0,95ef9f4d7e8c757916d4aa45045901e0df35d84bc26a83d251d1d38248a44580,2025-03-15T09:15:10.770000 CVE-2025-1058,0,0,931565082cf6be7adcbf5c17fdfd20136c63742e85ad7be32de9be500e9b2826,2025-02-13T06:15:21.480000 @@ -287403,6 +287403,7 @@ CVE-2025-27016,0,0,f2c7dbbbe198c036189ea7e0294285906759c96b4b4fc3925b1ca597f8d45 CVE-2025-27017,0,0,487799b83e349646c0969a6714868b1c6a1e0d2f10d5e6737c1115cacdd0bce5,2025-03-12T17:15:50.327000 CVE-2025-27018,0,0,94651ace51e56fbcc25f172f4073521c7860458186a53a829906ba80fd471017,2025-03-25T18:15:34.683000 CVE-2025-2702,0,0,7ef0bfa66e07c4fb7c181b57cab1217f373873ecf500d50de0d874610b07459c,2025-03-24T10:15:12.943000 +CVE-2025-2703,1,1,2205b741e07a5c28826e7a2bb22a4ae45c61884ca3714abecef7c9c3e3d3375f,2025-04-23T12:15:16.103000 CVE-2025-2704,0,0,f50441ffd3f3109d4071899808281b529314ab4de08ae18179b1bf16c0996e68,2025-04-07T18:15:45.560000 CVE-2025-2705,0,0,d7cf085971e80ff2f3017b9a76ca7e7c021414ba6b4da520921b330deccd7930,2025-03-27T16:45:46.410000 CVE-2025-2706,0,0,b7301874e71862c2693f8002ec404483a315cca246767eff2f97ca78b31281f9,2025-03-27T16:45:46.410000 @@ -288350,11 +288351,11 @@ CVE-2025-29453,0,0,a2e58f9ebedd09faa8f5b8c7cf4dd0bb582e3a5d84b4c3a6b8acbd211c4ad CVE-2025-29454,0,0,5b31c3fb27ca3ee6fbbb32d0103a3d996efa6dfbaee2eb3b11591ef72a1f79c7,2025-04-22T16:27:32.467000 CVE-2025-29455,0,0,7c7fd95c8b96fce1e3a46a57b9278141e5725af12d8a7f99040a2596bafdd725,2025-04-22T16:27:18.980000 CVE-2025-29456,0,0,eba1f73a5baa6c4daebd731d2aa12dd7114d7f1d3bce445a720c1b21c290d08d,2025-04-22T16:27:12.397000 -CVE-2025-29457,0,0,c4da2af5176a35a307224f1ad9fda4e236e5ada2e6c35133e6b07e8d9ec347c1,2025-04-21T14:23:45.950000 -CVE-2025-29458,0,0,eb15ca430178c3108ab78f2fbfe45677a4e6807432a2205e2e5b166b08559e80,2025-04-21T14:23:45.950000 -CVE-2025-29459,0,0,3f97edca86bb8d024d7a812a65ec90ed609911b982d73286b6a0adc440e328d1,2025-04-21T14:23:45.950000 +CVE-2025-29457,0,1,72de4cba51ff6a1dfad0fadfd4796cce5af7d8725e78d9dca0f6244ae11849a6,2025-04-23T13:15:56.817000 +CVE-2025-29458,0,1,e3aae86b7787463230d14138ae10a904ba24cce8ad19d96cce4f4b7402a320cd,2025-04-23T13:15:57.043000 +CVE-2025-29459,0,1,d4faa2b36f3d4360a8f4a4cd3bdc71712c85ea628a2b74f93135a14b40cd2944,2025-04-23T13:15:57.230000 CVE-2025-2946,0,0,173b47b6cf54f2d4ca733a6c0ccf10aec8d6c409a94ca3d5296d77eaf5773328,2025-04-07T14:18:34.453000 -CVE-2025-29460,0,0,7d3e55bfe98a941127ea51bb6f4d223e48f121a62febec83a7e977578fb437f8,2025-04-21T14:23:45.950000 +CVE-2025-29460,0,1,94c6186d1e2b314049c665874847ab1afcab0a1f7a3e199ab4a86ac85e305a6c,2025-04-23T13:15:57.423000 CVE-2025-29461,0,0,7307438871b586f1f5769735498483ac87f04d90e86a9258907a53702c296c27,2025-04-21T14:23:45.950000 CVE-2025-29462,0,0,4e1eef515a396085748d177ee774edfa2abd4137fc1ddaad52874b39f20b653a,2025-04-22T16:33:41.237000 CVE-2025-2947,0,0,7e354bbcc7dfac84c59a9258c55382cf9bea8911e8c88a5df5d0a946a8efa455,2025-04-17T20:21:05.203000 @@ -290403,7 +290404,7 @@ CVE-2025-32676,0,0,edda31a85e1e80659335a7efad0b821388c6101e9c57483f203af2d11a960 CVE-2025-32677,0,0,0b939f0f09bcf370798b3499511e1cd5b67829e82339dbf16d6568ab4594c213,2025-04-09T20:02:41.860000 CVE-2025-32678,0,0,b26975d5301172a858e1419f4271d362484ba209a53510009c67669d6a8ccdd9,2025-04-09T20:02:41.860000 CVE-2025-32679,0,0,bbacc21ac08d6f239be64c42a4ea3343b4ba4c7e91e4c5b5d593c74f30e94152,2025-04-09T20:02:41.860000 -CVE-2025-3268,0,0,1c279244d9f8edffa96ec2aecd2744961e414e474065ceb820fe5cd142964754,2025-04-07T16:15:26.430000 +CVE-2025-3268,0,1,84a285ebc220560728e6ca9ce300dceb0b0efe3242ae91b1bcd2ffdf7eeadf5c,2025-04-23T13:11:34.207000 CVE-2025-32680,0,0,bc0affb980c692e69e1b16cd9ed3b08eb8a8e88380b613fe1b873470370c2164,2025-04-09T20:02:41.860000 CVE-2025-32681,0,0,b73a09092179362c2d35eeda6d2b86a162194059b3bd047b5c27fcf6d5113deb,2025-04-11T15:39:52.920000 CVE-2025-32682,0,0,5c9b8e2ef938225e30c4976d2a250567a507176952598392cc04008e2ce792e4,2025-04-17T20:21:05.203000 @@ -290649,7 +290650,7 @@ CVE-2025-3376,0,0,7a37f0f61b13291a5b0b090aa3662687dd8750eefcbcfd49f49f88198dfd79 CVE-2025-3377,0,0,1072552839cf009ce9e5789acb607157bcca0acc7eab443c95d17db194b1cee8,2025-04-08T18:13:53.347000 CVE-2025-3378,0,0,b38c9311dae94aa2cd2de9a1c15e679066457afdae1f7a88ecee5e2cfc5101dd,2025-04-08T18:13:53.347000 CVE-2025-3379,0,0,be6f343dc3a4ee76acf20e46c29948ed4fd28d180c75f777f59a8bd28fdaecec,2025-04-08T18:13:53.347000 -CVE-2025-3380,0,0,153d1e47f55a6c63615d7c0a7bf08911392b4a1102bc574cfcd1bcc17eda0a2a,2025-04-08T18:13:53.347000 +CVE-2025-3380,0,1,f9e6dfc96caf3d03fcdf47f4f34c0a08d43c30824cb5c2f299d15c0ecf51abbf,2025-04-23T13:04:54.297000 CVE-2025-3381,0,0,71e3b3c54648b559c4279cbc063cbc5da5a79c218ec7763d5ef76124af6d9fda,2025-04-08T18:13:53.347000 CVE-2025-3382,0,0,9830a184308ca093b12d7a02bc227e3e7eb89d75a27df9ab876014b201d78c99,2025-04-08T18:13:53.347000 CVE-2025-3383,0,0,401c820e3770c4b11a45b3716da0c2eb8bcd31acd8f0a771030232ff4476d0cc,2025-04-09T14:47:11.020000 @@ -290724,7 +290725,7 @@ CVE-2025-3520,0,0,be35fd038c4a5e22088fd0e9352f3a187df9abda8d0ecfa9c4571aec785dc9 CVE-2025-3522,0,0,d7b10d589112af206a2a97a80b31b8312cbafe8f15fc0b775a5c292039712cf3,2025-04-15T19:16:08.057000 CVE-2025-3523,0,0,9e0b214a1ab217ceac11021882f71acf6e83d545f10dd5d4b8cac5015db5f14f,2025-04-15T18:39:27.967000 CVE-2025-3529,0,0,fee7e8dbf8e22172fe5da05e8272df7b08d63fbfaaff9a5a16be1d712957b828,2025-04-23T08:15:14.527000 -CVE-2025-3530,0,1,6f915dc2253ddcf623021079c111481772b3ee6e70dbaa37ca252f542a41b506,2025-04-23T08:15:14.723000 +CVE-2025-3530,0,0,6f915dc2253ddcf623021079c111481772b3ee6e70dbaa37ca252f542a41b506,2025-04-23T08:15:14.723000 CVE-2025-3531,0,0,a1decdd234168eb76bc68bc5b83f3982cca53fa01cc6afb6bd923d1aa0236709,2025-04-15T18:39:27.967000 CVE-2025-3532,0,0,a2f5d1e1aeeff6c317e31a6e6d9145846fef7ec6ec6973517901d1a73b613717,2025-04-15T18:39:27.967000 CVE-2025-3533,0,0,0517ee64c7ed259e758d3f181da415a253b558981950122d1448e5774aae3999,2025-04-15T18:39:27.967000 @@ -291054,12 +291055,12 @@ CVE-2025-40114,0,0,e4d744f28120ab6554e4d13f2f9f1eeaeee8726fca02a9f9f521440a390d4 CVE-2025-40325,0,0,a6e3862a6512d1062886fb893478a1faf062d9cb4443f34babdc0e4290aabe28,2025-04-21T14:23:45.950000 CVE-2025-40364,0,0,7079032d03c94977f22edeb418796e7b8ec133f463d81beda02e4d226b1c4205,2025-04-21T14:23:45.950000 CVE-2025-42599,0,0,9659da8e8aac322bbaf38e5450526281170e18645caf922988ff7e1c8a3c28d4,2025-04-21T14:23:45.950000 -CVE-2025-42600,1,1,1ee142eb2ccdf84d82305ae0488f79995fe777c9f50c5673c7ad425bf2a0ac3b,2025-04-23T11:15:46.603000 -CVE-2025-42601,1,1,ad34a158f5a71060131e6193290958eadeecac1a2f75c0605f2d65e61706340f,2025-04-23T11:15:46.797000 -CVE-2025-42602,1,1,68f2fa5ea678d0797a07d33b52336313d4690a153ef3db27f8cbccbd62e68dc6,2025-04-23T11:15:46.933000 -CVE-2025-42603,1,1,8c7df7376afdd67d289241b099529f589c9b5464cd7ae6e65238f634816e3b49,2025-04-23T11:15:47.063000 -CVE-2025-42604,1,1,1d6c455f719188a7b6908c79d097cad2a1bb2ed6aafe0bf34f961ec1cfc6d257,2025-04-23T11:15:47.190000 -CVE-2025-42605,1,1,a9b469d67d2bd8b3340309a4b239c2796f192b83a615984bee8e6a39ab35992b,2025-04-23T11:15:47.327000 +CVE-2025-42600,0,0,1ee142eb2ccdf84d82305ae0488f79995fe777c9f50c5673c7ad425bf2a0ac3b,2025-04-23T11:15:46.603000 +CVE-2025-42601,0,0,ad34a158f5a71060131e6193290958eadeecac1a2f75c0605f2d65e61706340f,2025-04-23T11:15:46.797000 +CVE-2025-42602,0,0,68f2fa5ea678d0797a07d33b52336313d4690a153ef3db27f8cbccbd62e68dc6,2025-04-23T11:15:46.933000 +CVE-2025-42603,0,0,8c7df7376afdd67d289241b099529f589c9b5464cd7ae6e65238f634816e3b49,2025-04-23T11:15:47.063000 +CVE-2025-42604,0,0,1d6c455f719188a7b6908c79d097cad2a1bb2ed6aafe0bf34f961ec1cfc6d257,2025-04-23T11:15:47.190000 +CVE-2025-42605,0,0,a9b469d67d2bd8b3340309a4b239c2796f192b83a615984bee8e6a39ab35992b,2025-04-23T11:15:47.327000 CVE-2025-42921,0,0,834c8fedea992fbe5ca87b916877d62b73585ee9a6a8a5b0642eefbb25f9e2c0,2025-04-17T20:21:05.203000 CVE-2025-43012,0,0,18e1af789e53f96a6c881eae07096e79716556b48ee757b9a80a5d7ad315fdf0,2025-04-17T20:21:05.203000 CVE-2025-43013,0,0,c510cb2dfb445e66117a5cd3ded26fb5498744f67e1da9853ed0361b21206154,2025-04-17T20:21:05.203000