diff --git a/CVE-2021/CVE-2021-280xx/CVE-2021-28025.json b/CVE-2021/CVE-2021-280xx/CVE-2021-28025.json index 07f532fa3c0..2f407f64790 100644 --- a/CVE-2021/CVE-2021-280xx/CVE-2021-28025.json +++ b/CVE-2021/CVE-2021-280xx/CVE-2021-28025.json @@ -2,19 +2,161 @@ "id": "CVE-2021-28025", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-11T14:15:12.453", - "lastModified": "2023-08-11T15:18:01.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T15:41:19.287", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Integer Overflow vulnerability in qsvghandler.cpp in Qt qtsvg versions 5.15.1, 6.0.0, 6.0.2, and 6.2, allows local attackers to cause a denial of service (DoS)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:5.15.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EA7FCB6B-872F-4900-A2CF-192AFECC4DFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.0.0:-:*:*:*:*:*:*", + "matchCriteriaId": "C0A66DBD-439D-45EA-BC80-502314D5B0AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.0.0:alpha1:*:*:*:*:*:*", + "matchCriteriaId": "D47A6409-4A47-4963-9D77-DCC92668B6F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.0.0:beta1:*:*:*:*:*:*", + "matchCriteriaId": "28417B5D-0086-436E-9698-20E8C3E5E2E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.0.0:beta2:*:*:*:*:*:*", + "matchCriteriaId": "9EDDE01F-6F8A-412E-BFE3-5D0561629D12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.0.0:beta3:*:*:*:*:*:*", + "matchCriteriaId": "F869EA5F-9246-48B2-8BF0-BF68DA091750" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.0.0:beta4:*:*:*:*:*:*", + "matchCriteriaId": "508C8F60-141E-4168-BCC8-114CD777D2E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.0.0:beta5:*:*:*:*:*:*", + "matchCriteriaId": "94F0B03A-ABD8-44AC-99D6-3232EC44DDE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.0.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "44C86D23-6D06-4A62-90C3-173852C1545B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.0.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "E1FFE318-54E1-44B8-9164-696EE8CE280C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "AC14C9CB-1965-4659-8254-17EAB448616D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.2.0:alpha1:*:*:*:*:*:*", + "matchCriteriaId": "B5846684-AB3C-4CF6-BEDB-660FDA8675DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.2.0:beta1:*:*:*:*:*:*", + "matchCriteriaId": "58B3621A-04A2-4302-9848-482B102895D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.2.0:beta2:*:*:*:*:*:*", + "matchCriteriaId": "EC7DBCDC-72EE-4C57-8E69-8A733A4F3602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.2.0:beta3:*:*:*:*:*:*", + "matchCriteriaId": "D6212764-5B80-4340-8150-E8CD918ED396" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.2.0:beta4:*:*:*:*:*:*", + "matchCriteriaId": "3D2F8A83-BB1A-4938-B1CD-2B604C43D4CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.2.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "EF6E8E02-CBCA-4AB3-8BDA-4177FEDECFF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:6.2.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "221D7C16-BB9A-4145-9D18-D68728AFBF3B" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugreports.qt.io/browse/QTBUG-91507", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-363xx/CVE-2022-36392.json b/CVE-2022/CVE-2022-363xx/CVE-2022-36392.json index 766b4980917..751917658f4 100644 --- a/CVE-2022/CVE-2022-363xx/CVE-2022-36392.json +++ b/CVE-2022/CVE-2022-363xx/CVE-2022-36392.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36392", "sourceIdentifier": "secure@intel.com", "published": "2023-08-11T03:15:13.250", - "lastModified": "2023-08-11T03:44:51.127", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T14:34:05.403", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,1142 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.12.94", + "matchCriteriaId": "11BC4447-C51A-4FE3-9961-44C003DD5E87" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:c232:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C3CC679-8CEE-41F9-8DD0-4B5B02D7BBF6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:c236:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D02651A-0F34-476D-B049-72C872464FC8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:c420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69ECA4C4-3A03-4C07-9461-63C84221CD80" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:c422:-:*:*:*:*:*:*:*", + "matchCriteriaId": "095F8957-9499-475C-8D68-A07A1140A4DE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:cm236:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAA5A85C-17B0-490F-853F-3451D2406F47" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:cm238:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1CA8160-27AD-4390-AF99-82CF31DDE94F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E20F674C-6522-42E4-85D9-B4C39A882D20" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.8.94", + "matchCriteriaId": "136B04D8-2CB6-47B0-9D6E-891DF57DA35B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4A62BA8-3AE3-4339-97D3-4768A122C71C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A2CDBC2-2B45-4E22-845A-EB8415D4C56D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25227F52-7398-4E68-A973-B9177886BE0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B230FB82-C498-4118-97D3-3835CB713E87" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*", + "matchCriteriaId": "790A7B55-AD96-4B1C-A31A-C6778BFD5CC5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EDCD661-394A-431F-84C2-0252ABD6F1B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09271283-1681-4EB4-8BD3-DE01674D4D19" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B23A6C6-89CF-42CA-A3D0-E17EB8104BBE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2715B64C-204D-4243-944E-434FDA366AA9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:hm170:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6CEAEB8-C0DD-4886-8EBB-D244A87338C7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:hm175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDA12EE0-6877-431B-8CC9-9C7576444E64" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73A05885-8AFD-4FFA-BE18-9CE24A1427B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7BB0694-7F15-4784-97AA-9E9783B3702C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6E4C9D1-C1E8-43E1-88B8-76637A991EB1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "64E68EB4-7634-42AB-8DCD-8C87C86F78E1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:qm170:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49495821-5D75-49F0-B2BB-2F73441731D1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:qm175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "634DFA37-FE38-423B-92FA-01AAB0B389E3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E20F674C-6522-42E4-85D9-B4C39A882D20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6E0469E-FFC6-46BF-BB03-34326D1DBE19" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "955612CC-223F-47C0-9D75-D71A39E61A3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.0.93", + "matchCriteriaId": "34D35636-BCC5-4C47-88E3-B8681CD79440" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0829C549-51C2-4029-9623-51D0C5470FBB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6CC7A911-2CFA-44B3-9B5D-824C02A92D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7FDE41F-FF2A-42F0-AF4D-F57A28E377F4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4AB420EA-D647-4272-8A96-2A09E70FAEAE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6910BDD0-4968-45AE-AD19-3A1206F5D068" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14C91CFB-C318-4F06-9A01-DCCEE2E901B4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5C0F89F-0C58-44B8-A02C-50A97B086659" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:cm246:-:*:*:*:*:*:*:*", + "matchCriteriaId": "246F7FE9-0B21-4947-B6C2-6CA2DB1D7817" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25227F52-7398-4E68-A973-B9177886BE0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B230FB82-C498-4118-97D3-3835CB713E87" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*", + "matchCriteriaId": "790A7B55-AD96-4B1C-A31A-C6778BFD5CC5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EDCD661-394A-431F-84C2-0252ABD6F1B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DD64A3C-6925-4715-9D55-F1FC8AA0BB95" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D7D83701-E7FF-41D3-ACC6-C78519E34FBD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:hm370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1893AF0C-A12E-4DDE-88D6-44A4318176D2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D376C32-99BE-4DF4-A63D-2156D10EEA73" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CD6D64A-BC68-458E-810B-9EEDFD35817A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:qm370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "205568C6-2BBB-4B1B-A609-5448F8B7E22E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD09C370-3A22-4AFD-89D7-C35B152C4DE6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9379A170-4752-49F2-941D-75D88D385966" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.1.70", + "matchCriteriaId": "55DE4BD2-14AA-44EB-A031-644934344F67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.5.0", + "versionEndExcluding": "14.5.50", + "matchCriteriaId": "180F0BC8-3FBB-4ADE-8679-169E4C308D00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFB47F1D-AE3D-4F0E-AEFE-879140B47DD5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE191F8B-AC43-431E-87F7-46E2EF211D27" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C530D5AA-7480-45A7-BF06-45BF95B96B22" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D7E83B0-4902-40CF-9B24-3358846186E8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:hm470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9AC90E6-DF0B-4370-825E-41E4986D30CE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61E425A8-F0F9-4C38-B199-0A410F0D0270" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F945B90-257C-4DCB-9CB3-F34C6F6529D3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:qm480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D4ACE9D-B829-44BD-8124-30BD62E8F8B4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5AE97F1-0236-4305-BC0B-253160262125" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8621ECA8-A467-471E-A871-72EDD10BB2FF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wm490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AC3826E-7DA9-4A86-836F-7F3B32AEB3D2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D16ACC77-CE53-4897-BEF8-50CFE7AD56FE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.45", + "matchCriteriaId": "59579717-55D1-402C-870F-3BED480A32CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:b560:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE930AA-59F7-43A7-9FF3-363CE72A6728" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h510:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D67C6D6B-12F3-43A6-BB8D-DFE0B6483294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96F1DD9B-C078-41C5-88E0-DB7705E17742" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:hm570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D9BD5A1-AD1F-4770-87EE-7F1804BA87A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:hm570e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "242BA56E-E8D0-4851-AA71-FECB9E102F87" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44BCD8EB-D71A-4BD6-8D2D-AF2430F840C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:qm580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61AB83BE-01F0-412B-98E9-B766884BF249" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:qm580e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CDD634A-B6BA-452C-A6E0-18ADEFF81529" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:rm590e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1C4E46E-5828-4EE6-9A95-8F4FE56AC156" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:w580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE366EB3-BE96-4A01-9BD5-792B59163938" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wm590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4158B9A6-ACBE-4A62-AA2C-9790F73C4C3C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:z590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89563A0F-CE7A-41C5-A8C7-9FC2D40F000A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.1.27", + "matchCriteriaId": "E7317CB4-D0A7-4508-83AD-6C30CF407E96" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:b660:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2576527C-0218-491F-871E-07A60A5E1C25" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A68DECC9-072F-43C0-90EF-02E8BBC9AE4C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h610e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B973879-DE48-4461-B543-98625EABCCE4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BCF3A230-7824-4417-B5C4-E2D30ECBE3AE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:hm670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70675897-E01D-4217-82AE-EC15AE58390E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3DBB4E3-B863-4333-AC01-DB21416FCB94" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q670e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B479403-BA34-426F-8DB6-61303C57F268" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:r680e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20D230F-E14A-4986-8746-168CC9C61AD0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:w680:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF31448A-E935-4FFF-AF76-2B06EF71E229" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wm690:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5B7B7CD-63B7-4F80-A0A1-7C69F0868D1B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:z690:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D1C667A-A904-4707-BE7E-FF7530E0D716" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-389xx/CVE-2022-38973.json b/CVE-2022/CVE-2022-389xx/CVE-2022-38973.json index c92cde7c834..c3325bd9660 100644 --- a/CVE-2022/CVE-2022-389xx/CVE-2022-38973.json +++ b/CVE-2022/CVE-2022-389xx/CVE-2022-38973.json @@ -2,8 +2,8 @@ "id": "CVE-2022-38973", "sourceIdentifier": "secure@intel.com", "published": "2023-08-11T03:15:14.240", - "lastModified": "2023-08-11T03:44:51.127", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T14:34:40.520", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,81 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:arc_a750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "720400DE-6327-473C-B50B-AB9477912723" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:arc_a750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E92E63D9-B5E9-49F7-B96F-9C4BE6B8F41C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:arc_a770_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "605707F5-7F3E-4336-A8FA-BCB61AE6E751" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:arc_a770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE38F333-3BA1-4C84-A311-5DFC90A0BEAA" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00812.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-419xx/CVE-2022-41984.json b/CVE-2022/CVE-2022-419xx/CVE-2022-41984.json index 268abf3c49b..274a994ba55 100644 --- a/CVE-2022/CVE-2022-419xx/CVE-2022-41984.json +++ b/CVE-2022/CVE-2022-419xx/CVE-2022-41984.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41984", "sourceIdentifier": "secure@intel.com", "published": "2023-08-11T03:15:15.307", - "lastModified": "2023-08-11T03:44:51.127", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T14:33:50.620", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,81 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:arc_a750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "720400DE-6327-473C-B50B-AB9477912723" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:arc_a750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E92E63D9-B5E9-49F7-B96F-9C4BE6B8F41C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:arc_a770_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "605707F5-7F3E-4336-A8FA-BCB61AE6E751" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:arc_a770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE38F333-3BA1-4C84-A311-5DFC90A0BEAA" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00812.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45112.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45112.json index cfd93ea8678..86fd1e3ef00 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45112.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45112.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45112", "sourceIdentifier": "secure@intel.com", "published": "2023-08-11T03:15:16.437", - "lastModified": "2023-08-11T03:44:51.127", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T14:34:23.620", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:virtual_raid_on_cpu:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.0.0.4035", + "matchCriteriaId": "D5F2140A-F65D-456B-8E70-11360B17E1F8" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00846.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-222xx/CVE-2023-22276.json b/CVE-2023/CVE-2023-222xx/CVE-2023-22276.json index c0a59eb1104..bf934bfbe95 100644 --- a/CVE-2023/CVE-2023-222xx/CVE-2023-22276.json +++ b/CVE-2023/CVE-2023-222xx/CVE-2023-22276.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22276", "sourceIdentifier": "secure@intel.com", "published": "2023-08-11T03:15:16.613", - "lastModified": "2023-08-11T03:44:51.127", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T14:31:52.990", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,111 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:ethernet_network_controller_e810-xxvam2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.7.2.4", + "matchCriteriaId": "D234BAF3-82F7-4050-AFC4-9F920FB0054A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:ethernet_network_controller_e810-xxvam2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFC7B304-7705-40F7-A357-5F7E8FD71E47" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:ethernet_network_controller_e810-cam1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.7.2.4", + "matchCriteriaId": "942E4413-6421-4520-842F-83D5DB6805E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:ethernet_network_controller_e810-cam1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "839854C2-8442-4EB8-8FE0-434FEAD3B559" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:ethernet_network_controller_e810-cam2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.7.2.4", + "matchCriteriaId": "DF401F02-CFDE-4E67-B676-26FF6184FEA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:ethernet_network_controller_e810-cam2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42E8F0FF-94C1-4AB5-A9D3-D2963A2200F3" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00835.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2606.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2606.json index 15f2ba50e39..38afbbf57c0 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2606.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2606.json @@ -2,15 +2,38 @@ "id": "CVE-2023-2606", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-14T20:15:11.080", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T14:05:18.320", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The WP Brutal AI WordPress plugin before 2.06 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brutalplugins:wp_brutal_ai:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.06", + "matchCriteriaId": "E8F4E90D-1C82-49DD-B491-A4841BFDB9A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/62deb3ed-a7e4-4cdc-a615-cad2ec2e1e8f", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2802.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2802.json index 87d4f2ca263..9df44861348 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2802.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2802.json @@ -2,15 +2,38 @@ "id": "CVE-2023-2802", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-14T20:15:11.297", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T14:27:16.020", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Ultimate Addons for Contact Form 7 WordPress plugin before 3.1.29 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themefic:ultimate_addons_for_contact_form_7:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.29", + "matchCriteriaId": "56F326EB-BF3E-4B11-9605-75D5B0403DCB" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/c5cc136a-2fa6-44ff-b5b5-26d367937df9", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32267.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32267.json index 5d8df728ea2..2176da6be5f 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32267.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32267.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32267", "sourceIdentifier": "security@opentext.com", "published": "2023-08-11T14:15:13.150", - "lastModified": "2023-08-11T15:18:01.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T15:48:26.110", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security@opentext.com", "type": "Secondary", @@ -34,10 +54,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:arcsight_management_center:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.1", + "matchCriteriaId": "A68E42E3-4571-46AC-91FE-23CDC1F115A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://portal.microfocus.com/s/article/KM000020296?language=en_US", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39553.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39553.json index 0dcd6c4f368..4e24af3be9a 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39553.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39553.json @@ -2,15 +2,38 @@ "id": "CVE-2023-39553", "sourceIdentifier": "security@apache.org", "published": "2023-08-11T08:15:09.103", - "lastModified": "2023-08-11T15:15:10.837", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T15:55:47.347", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Drill Provider.\n\nApache Airflow Drill Provider is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection with DrillHook giving an opportunity to read files on the Airflow server.\nThis issue affects Apache Airflow Drill Provider: before 2.4.3.\nIt is recommended to upgrade to a version that is not affected.\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -23,18 +46,49 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:apache-airflow-providers-apache-drill:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.3", + "matchCriteriaId": "A3513EAE-88C8-489D-AA08-1AB4D382503E" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2023/08/11/1", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] }, { "url": "https://github.com/apache/airflow/pull/33074", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Patch" + ] }, { "url": "https://lists.apache.org/thread/ozpl0opmob49rkcz8svo8wkxyw1395sf", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40235.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40235.json index 70bdc183d48..c82287973e9 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40235.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40235.json @@ -2,31 +2,100 @@ "id": "CVE-2023-40235", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-10T23:15:09.957", - "lastModified": "2023-08-11T03:44:51.127", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T14:38:48.630", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An NTLM Hash Disclosure was discovered in ArchiMate Archi before 5.1.0. When parsing the XMLNS value of an ArchiMate project file, if the namespace does not match the expected ArchiMate URL, the parser will access the provided resource. If the provided resource is a UNC path pointing to a share server that does not accept a guest account, the host will try to authenticate on the share by using the current user's session. NOTE: this issue occurs because Archi uses an unsafe configuration of the Eclipse Modeling Framework." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opengroup:archi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.1.0", + "matchCriteriaId": "C770113C-74AA-4FDD-9AA4-CFC3FD4CEEC6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/archimatetool/archi/commit/bcab676beddfbeddffecacf755b6692f0b0151f1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/archimatetool/archi/compare/release_5.0.2...release_5.1.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/archimatetool/archi/issues/946", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/eclipse-emf/org.eclipse.emf/issues/8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40303.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40303.json index 92ab4e703e0..4cbb3573917 100644 --- a/CVE-2023/CVE-2023-403xx/CVE-2023-40303.json +++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40303.json @@ -2,27 +2,92 @@ "id": "CVE-2023-40303", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T05:15:10.233", - "lastModified": "2023-08-14T13:06:15.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T14:24:42.610", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "GNU inetutils through 2.4 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-252" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnu:inetutils:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.4", + "matchCriteriaId": "7262D919-99CB-4C30-94B8-F0D1AD4A628F" + } + ] + } + ] + } + ], "references": [ { "url": "https://ftp.gnu.org/gnu/inetutils/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://git.savannah.gnu.org/cgit/inetutils.git/commit/?id=e4e65c03f4c11292a3e40ef72ca3f194c8bffdd6", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://lists.gnu.org/archive/html/bug-inetutils/2023-07/msg00000.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index d8e2470012f..1bed6cc35ba 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-08-21T14:00:29.661992+00:00 +2023-08-21T16:00:31.634679+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-08-21T13:50:03.827000+00:00 +2023-08-21T15:55:47.347000+00:00 ``` ### Last Data Feed Release @@ -34,42 +34,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `0` -* [CVE-2020-28715](CVE-2020/CVE-2020-287xx/CVE-2020-28715.json) (`2023-08-21T12:15:07.913`) -* [CVE-2023-38899](CVE-2023/CVE-2023-388xx/CVE-2023-38899.json) (`2023-08-21T12:15:08.483`) -* [CVE-2023-40735](CVE-2023/CVE-2023-407xx/CVE-2023-40735.json) (`2023-08-21T12:15:09.410`) ### CVEs modified in the last Commit -Recently modified CVEs: `50` +Recently modified CVEs: `12` -* [CVE-2023-4441](CVE-2023/CVE-2023-44xx/CVE-2023-4441.json) (`2023-08-21T12:47:13.573`) -* [CVE-2023-4442](CVE-2023/CVE-2023-44xx/CVE-2023-4442.json) (`2023-08-21T12:47:13.573`) -* [CVE-2023-39784](CVE-2023/CVE-2023-397xx/CVE-2023-39784.json) (`2023-08-21T12:47:13.573`) -* [CVE-2023-39785](CVE-2023/CVE-2023-397xx/CVE-2023-39785.json) (`2023-08-21T12:47:13.573`) -* [CVE-2023-39786](CVE-2023/CVE-2023-397xx/CVE-2023-39786.json) (`2023-08-21T12:47:13.573`) -* [CVE-2023-39807](CVE-2023/CVE-2023-398xx/CVE-2023-39807.json) (`2023-08-21T12:47:13.573`) -* [CVE-2023-39808](CVE-2023/CVE-2023-398xx/CVE-2023-39808.json) (`2023-08-21T12:47:13.573`) -* [CVE-2023-39809](CVE-2023/CVE-2023-398xx/CVE-2023-39809.json) (`2023-08-21T12:47:13.573`) -* [CVE-2023-4443](CVE-2023/CVE-2023-44xx/CVE-2023-4443.json) (`2023-08-21T12:47:13.573`) -* [CVE-2023-4444](CVE-2023/CVE-2023-44xx/CVE-2023-4444.json) (`2023-08-21T12:47:13.573`) -* [CVE-2023-4445](CVE-2023/CVE-2023-44xx/CVE-2023-4445.json) (`2023-08-21T12:47:13.573`) -* [CVE-2023-4446](CVE-2023/CVE-2023-44xx/CVE-2023-4446.json) (`2023-08-21T12:47:13.573`) -* [CVE-2023-39617](CVE-2023/CVE-2023-396xx/CVE-2023-39617.json) (`2023-08-21T12:47:13.573`) -* [CVE-2023-39618](CVE-2023/CVE-2023-396xx/CVE-2023-39618.json) (`2023-08-21T12:47:13.573`) -* [CVE-2023-4447](CVE-2023/CVE-2023-44xx/CVE-2023-4447.json) (`2023-08-21T12:47:13.573`) -* [CVE-2023-40711](CVE-2023/CVE-2023-407xx/CVE-2023-40711.json) (`2023-08-21T12:47:18.157`) -* [CVE-2023-4434](CVE-2023/CVE-2023-44xx/CVE-2023-4434.json) (`2023-08-21T12:47:18.157`) -* [CVE-2023-4435](CVE-2023/CVE-2023-44xx/CVE-2023-4435.json) (`2023-08-21T12:47:18.157`) -* [CVE-2023-37369](CVE-2023/CVE-2023-373xx/CVE-2023-37369.json) (`2023-08-21T12:47:18.157`) -* [CVE-2023-37250](CVE-2023/CVE-2023-372xx/CVE-2023-37250.json) (`2023-08-21T12:47:18.157`) -* [CVE-2023-4451](CVE-2023/CVE-2023-44xx/CVE-2023-4451.json) (`2023-08-21T12:47:18.157`) -* [CVE-2023-36674](CVE-2023/CVE-2023-366xx/CVE-2023-36674.json) (`2023-08-21T12:47:18.157`) -* [CVE-2023-21235](CVE-2023/CVE-2023-212xx/CVE-2023-21235.json) (`2023-08-21T13:37:06.693`) -* [CVE-2023-38857](CVE-2023/CVE-2023-388xx/CVE-2023-38857.json) (`2023-08-21T13:48:29.323`) -* [CVE-2023-4349](CVE-2023/CVE-2023-43xx/CVE-2023-4349.json) (`2023-08-21T13:50:03.827`) +* [CVE-2021-28025](CVE-2021/CVE-2021-280xx/CVE-2021-28025.json) (`2023-08-21T15:41:19.287`) +* [CVE-2022-41984](CVE-2022/CVE-2022-419xx/CVE-2022-41984.json) (`2023-08-21T14:33:50.620`) +* [CVE-2022-36392](CVE-2022/CVE-2022-363xx/CVE-2022-36392.json) (`2023-08-21T14:34:05.403`) +* [CVE-2022-45112](CVE-2022/CVE-2022-451xx/CVE-2022-45112.json) (`2023-08-21T14:34:23.620`) +* [CVE-2022-38973](CVE-2022/CVE-2022-389xx/CVE-2022-38973.json) (`2023-08-21T14:34:40.520`) +* [CVE-2023-2606](CVE-2023/CVE-2023-26xx/CVE-2023-2606.json) (`2023-08-21T14:05:18.320`) +* [CVE-2023-40303](CVE-2023/CVE-2023-403xx/CVE-2023-40303.json) (`2023-08-21T14:24:42.610`) +* [CVE-2023-2802](CVE-2023/CVE-2023-28xx/CVE-2023-2802.json) (`2023-08-21T14:27:16.020`) +* [CVE-2023-22276](CVE-2023/CVE-2023-222xx/CVE-2023-22276.json) (`2023-08-21T14:31:52.990`) +* [CVE-2023-40235](CVE-2023/CVE-2023-402xx/CVE-2023-40235.json) (`2023-08-21T14:38:48.630`) +* [CVE-2023-32267](CVE-2023/CVE-2023-322xx/CVE-2023-32267.json) (`2023-08-21T15:48:26.110`) +* [CVE-2023-39553](CVE-2023/CVE-2023-395xx/CVE-2023-39553.json) (`2023-08-21T15:55:47.347`) ## Download and Usage