From 0c41c9fd3dc5c63b3e1523be34b7cec0518ae986 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ren=C3=A9=20Helmke?= Date: Wed, 10 May 2023 20:00:27 +0200 Subject: [PATCH] Auto-Update: 2023-05-10T18:00:24.343146+00:00 --- CVE-2022/CVE-2022-307xx/CVE-2022-30759.json | 71 +- CVE-2022/CVE-2022-316xx/CVE-2022-31643.json | 2694 +++++++++++++++- CVE-2022/CVE-2022-419xx/CVE-2022-41985.json | 59 + CVE-2022/CVE-2022-45xx/CVE-2022-4568.json | 57 +- CVE-2022/CVE-2022-463xx/CVE-2022-46377.json | 59 + CVE-2022/CVE-2022-463xx/CVE-2022-46378.json | 59 + CVE-2022/CVE-2022-484xx/CVE-2022-48482.json | 82 +- CVE-2022/CVE-2022-484xx/CVE-2022-48483.json | 71 +- CVE-2023/CVE-2023-00xx/CVE-2023-0007.json | 55 + CVE-2023/CVE-2023-00xx/CVE-2023-0008.json | 55 + CVE-2023/CVE-2023-15xx/CVE-2023-1526.json | 322 +- CVE-2023/CVE-2023-249xx/CVE-2023-24958.json | 164 +- CVE-2023/CVE-2023-260xx/CVE-2023-26010.json | 47 +- CVE-2023/CVE-2023-260xx/CVE-2023-26012.json | 47 +- CVE-2023/CVE-2023-262xx/CVE-2023-26268.json | 92 +- CVE-2023/CVE-2023-26xx/CVE-2023-2629.json | 59 + CVE-2023/CVE-2023-26xx/CVE-2023-2630.json | 59 + CVE-2023/CVE-2023-278xx/CVE-2023-27892.json | 78 +- CVE-2023/CVE-2023-290xx/CVE-2023-29057.json | 3182 ++++++++++++++++++- CVE-2023/CVE-2023-298xx/CVE-2023-29827.json | 65 +- CVE-2023/CVE-2023-298xx/CVE-2023-29856.json | 80 +- CVE-2023/CVE-2023-298xx/CVE-2023-29867.json | 65 +- CVE-2023/CVE-2023-299xx/CVE-2023-29994.json | 64 +- CVE-2023/CVE-2023-300xx/CVE-2023-30024.json | 92 +- CVE-2023/CVE-2023-303xx/CVE-2023-30351.json | 24 + CVE-2023/CVE-2023-303xx/CVE-2023-30352.json | 20 + CVE-2023/CVE-2023-303xx/CVE-2023-30353.json | 20 + CVE-2023/CVE-2023-303xx/CVE-2023-30354.json | 24 + CVE-2023/CVE-2023-303xx/CVE-2023-30356.json | 20 + CVE-2023/CVE-2023-304xx/CVE-2023-30403.json | 80 +- CVE-2023/CVE-2023-306xx/CVE-2023-30619.json | 65 +- CVE-2023/CVE-2023-308xx/CVE-2023-30853.json | 64 +- CVE-2023/CVE-2023-308xx/CVE-2023-30856.json | 69 +- CVE-2023/CVE-2023-309xx/CVE-2023-30943.json | 106 +- CVE-2023/CVE-2023-309xx/CVE-2023-30944.json | 127 +- CVE-2023/CVE-2023-315xx/CVE-2023-31554.json | 20 + CVE-2023/CVE-2023-315xx/CVE-2023-31555.json | 20 + CVE-2023/CVE-2023-315xx/CVE-2023-31556.json | 20 + CVE-2023/CVE-2023-315xx/CVE-2023-31557.json | 20 + CVE-2023/CVE-2023-315xx/CVE-2023-31566.json | 20 + CVE-2023/CVE-2023-315xx/CVE-2023-31567.json | 20 + CVE-2023/CVE-2023-315xx/CVE-2023-31568.json | 20 + README.md | 172 +- 43 files changed, 8373 insertions(+), 236 deletions(-) create mode 100644 CVE-2022/CVE-2022-419xx/CVE-2022-41985.json create mode 100644 CVE-2022/CVE-2022-463xx/CVE-2022-46377.json create mode 100644 CVE-2022/CVE-2022-463xx/CVE-2022-46378.json create mode 100644 CVE-2023/CVE-2023-00xx/CVE-2023-0007.json create mode 100644 CVE-2023/CVE-2023-00xx/CVE-2023-0008.json create mode 100644 CVE-2023/CVE-2023-26xx/CVE-2023-2629.json create mode 100644 CVE-2023/CVE-2023-26xx/CVE-2023-2630.json create mode 100644 CVE-2023/CVE-2023-303xx/CVE-2023-30351.json create mode 100644 CVE-2023/CVE-2023-303xx/CVE-2023-30352.json create mode 100644 CVE-2023/CVE-2023-303xx/CVE-2023-30353.json create mode 100644 CVE-2023/CVE-2023-303xx/CVE-2023-30354.json create mode 100644 CVE-2023/CVE-2023-303xx/CVE-2023-30356.json create mode 100644 CVE-2023/CVE-2023-315xx/CVE-2023-31554.json create mode 100644 CVE-2023/CVE-2023-315xx/CVE-2023-31555.json create mode 100644 CVE-2023/CVE-2023-315xx/CVE-2023-31556.json create mode 100644 CVE-2023/CVE-2023-315xx/CVE-2023-31557.json create mode 100644 CVE-2023/CVE-2023-315xx/CVE-2023-31566.json create mode 100644 CVE-2023/CVE-2023-315xx/CVE-2023-31567.json create mode 100644 CVE-2023/CVE-2023-315xx/CVE-2023-31568.json diff --git a/CVE-2022/CVE-2022-307xx/CVE-2022-30759.json b/CVE-2022/CVE-2022-307xx/CVE-2022-30759.json index cf2802964f2..ded5e0222fd 100644 --- a/CVE-2022/CVE-2022-307xx/CVE-2022-30759.json +++ b/CVE-2022/CVE-2022-307xx/CVE-2022-30759.json @@ -2,23 +2,84 @@ "id": "CVE-2022-30759", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-02T21:15:09.147", - "lastModified": "2023-05-03T10:33:46.147", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:46:11.517", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Nokia One-NDS (aka Network Directory Server) through 20.9, some Sudo permissions can be exploited by some users to escalate to root privileges and execute arbitrary commands." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nokia:one-nds:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20.9", + "matchCriteriaId": "0428582C-5A0B-4CFB-AA47-975517F2C5D5" + } + ] + } + ] + } + ], "references": [ { "url": "https://packetstormsecurity.com/files/171971/Nokia-OneNDS-20.9-Insecure-Permissions-Privilege-Escalation.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.nokia.com/networks/products/one-nds/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31643.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31643.json index b36d001eb27..2d722c1745b 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31643.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31643.json @@ -2,19 +2,2705 @@ "id": "CVE-2022-31643", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-04-28T16:15:09.640", - "lastModified": "2023-04-28T17:06:22.820", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T17:05:29.027", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A potential security vulnerability has been identified in the system BIOS for certain HP PC products which may allow loss of integrity. HP is releasing firmware updates to mitigate the potential vulnerability." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elite_dragonfly_g3_firmware:01.03.01:*:*:*:*:*:*:*", + "matchCriteriaId": "0D37E86F-560F-44EF-B129-F0FE16984583" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elite_dragonfly_g3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "124AEDB5-3716-44E2-9F49-646E31834C02" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:dragonfly_folio_g3_firmware:01.03.01:*:*:*:*:*:*:*", + "matchCriteriaId": "CDB824B8-8D3B-494B-A976-816D3EF8B116" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:dragonfly_folio_g3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12DFC193-4424-45D4-8B8D-16A139132A51" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elite_dragonfly_g2_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "DB5252E8-AA98-4E25-9310-215EB82A82E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28829816-379A-43CA-B2B0-2DDC32C9EFA7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elite_dragonfly_max_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "516E892D-9A24-4B13-8702-123AD83C8469" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*", + "matchCriteriaId": "301EE3DA-31B5-44E3-B6B7-1E3A87B24F65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elite_x2_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFFA707-F240-4DB3-BECC-AAF5A35A2391" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elite_x2_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0795E7C5-4FDF-40BA-92D3-2713CAD5B098" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elite_x360_1040_g9_firmware:01.03.01:*:*:*:*:*:*:*", + "matchCriteriaId": "5D24322D-5C60-40ED-87A3-CD4BFAA53014" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elite_x360_1040_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D1888D3-AF3E-4C8B-AC38-F183F0D7E61B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elite_x360_830_g9_firmware:01.03.01:*:*:*:*:*:*:*", + "matchCriteriaId": "E766537A-D1B4-4B36-9FE9-E4D2C2A0B235" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elite_x360_830_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FA311AF-952A-4249-8285-636B22601C83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_1040_g9_firmware:01.03.01:*:*:*:*:*:*:*", + "matchCriteriaId": "3B8FE317-1830-49DB-8187-15420A555B8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_1040_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7823AE3-76BB-4638-949E-6D785A00C222" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_630_g9_firmware:01.04.00:*:*:*:*:*:*:*", + "matchCriteriaId": "9E11BDBB-762F-47CB-BAB0-A335C93209B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_630_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "874AE70B-2176-4B08-9264-62241E65A06F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_640_g9_firmware:01.04.00:*:*:*:*:*:*:*", + "matchCriteriaId": "08E0E50F-87F9-4188-8048-7FB462DBDA6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_640_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA963C0F-AFFE-41B4-A0A0-7C8BEAFA1795" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_645_g9_firmware:01.08.01:*:*:*:*:*:*:*", + "matchCriteriaId": "6D10C722-88ED-4DCE-8B78-748E8127C123" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_645_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E12FA94-3524-459A-8B84-FC90887EFF21" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_650_g9_firmware:01.04.00:*:*:*:*:*:*:*", + "matchCriteriaId": "9EDCFD4E-C209-4304-8881-ED0B69BDEC7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_650_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC0925D-AFC9-47FB-8DBA-392F156F6324" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_655_g9_firmware:01.08.01:*:*:*:*:*:*:*", + "matchCriteriaId": "A7AE821C-9250-4A02-A533-8F27E4BC6982" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_655_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D738D26-4235-407C-8C0A-724E3F226A81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_830_g9_firmware:01.03.01:*:*:*:*:*:*:*", + "matchCriteriaId": "FAF50A86-A295-43AA-9796-9810DE51D19B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_830_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5CF95C1-FF31-4541-A082-B8E7BD2DF192" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_830_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "66056E25-77A5-4A53-BB66-3F94021D59BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D306687B-3EF9-40B4-88E1-F9840FBF332C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_835_g9_firmware:01.02.01:*:*:*:*:*:*:*", + "matchCriteriaId": "375F12A9-36D4-4F24-8D0A-CFC8ABCB784F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_835_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2649C10-3185-4932-9CD8-D979038BC11D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_835_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "1B89CDCE-5AD9-4426-9F37-B11841DA0B7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_835_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B516B02-6478-4E30-B175-1A5142263B1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_840_g9_firmware:01.03.01:*:*:*:*:*:*:*", + "matchCriteriaId": "084C03A2-B91A-471E-9539-4B8F18CACC1B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_840_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D2D1C0F6-09EB-472E-8971-E5DD1F01C612" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "8024C1A9-32FA-401F-A5E7-A6B379DE26BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5446ABE-8540-4DF0-A3EA-BEE74199856C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_840_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "F22D08D5-F476-4B81-9443-5BEE599563A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A27335B7-81BA-4A1D-922B-CE34EBD31A60" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_845_g9_firmware:01.02.01:*:*:*:*:*:*:*", + "matchCriteriaId": "9826F1CC-61B0-4A53-B219-F2B3D055C6B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_845_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5EE158F-F6D4-4ED0-90B9-D8293AEEF7EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_845_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "509FCA2E-9098-4F7B-9D30-5D4D45FECB39" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_845_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F86677F1-6A09-4E95-B57D-734F854AA52A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_850_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "335666BA-D588-43FC-BEBB-BFF619E89E9B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BCEF5B4C-DB2B-4406-8EE1-7E5A63E89045" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_855_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "4570A4BD-38E8-4459-845B-E7F7A7A596B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_855_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB0C9422-3123-4DDF-83CF-3D10AB9C359D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_860_g9_firmware:01.03.01:*:*:*:*:*:*:*", + "matchCriteriaId": "D1EDDA67-22FF-4F9B-A1AF-F50B635C6F99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_860_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A017F01-C278-4937-86DE-283E9E8DAFA6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_865_g9_firmware:01.02.01:*:*:*:*:*:*:*", + "matchCriteriaId": "FE5FBDD9-6AF9-4F19-947C-338925022A93" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_865_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC5F1FB7-E91C-4220-A8D5-C6306FA958EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "B1CDB13A-993B-4134-8EC9-957D102DB65D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0C27ABA-63FC-4DCE-925A-1C8A3D5D73F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "161863F1-4F5B-4451-94D8-C29CAAB54C6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F3FE302-C270-4C5E-B8AF-A140843E7E3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "75B9AEF8-2586-4DD1-B3DF-B0F7F4F2563D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87B40BA1-1F6C-4786-9F33-52EEF0ADE083" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:pro_x360_fortis_g10_firmware:01.03.00:*:*:*:*:*:*:*", + "matchCriteriaId": "72387993-0DDC-41E8-A7B3-45FBB330256F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pro_x360_fortis_g10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70BE965C-A20D-4F4A-96B7-104D432E55D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:pro_x360_fortis_g9_firmware:01.03.00:*:*:*:*:*:*:*", + "matchCriteriaId": "3E977AC3-07DC-4541-AC26-2BDAA5794F5A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pro_x360_fortis_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8709AD4-4B42-46CD-B2BE-B7CF17AFEC83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_430_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "EE59E5A9-61E1-48B4-AD18-CC2AE3EA4BC0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "986AAA40-9DC9-4D20-A4DA-2D02636C1A62" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_440_g9_firmware:01.04.00:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F89C76-13FD-4C0C-A6A8-4FDAA1EDE988" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_440_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B9B12E-09FC-4E40-B983-28C4A205096C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_440_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "993ACC43-9A8A-486E-9478-8B67FBAC5521" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F93D1E8-C7A7-4B35-9389-AAC3DD0FA978" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_445_g9_firmware:01.08.01:*:*:*:*:*:*:*", + "matchCriteriaId": "D46D9053-721A-4B4E-9C50-954F9A79CC5A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_445_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3588FA34-F7E8-48FA-9178-4D59518F9D4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_445_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "F87E8796-8913-4F92-B74F-ACC6D83642CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_445_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDD14C52-DD66-485B-AE52-1CBA39B06FB7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_450_g9_firmware:01.04.00:*:*:*:*:*:*:*", + "matchCriteriaId": "8FA3DD3B-E958-4363-B9C3-DEF652FBB780" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_450_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16F30536-3130-4E56-A159-54363618E89E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_450_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "B080BB04-167C-498D-A5B9-799F96B27743" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1982269-50DD-4939-8158-4B7357D7AEE4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_455_g9_firmware:01.08.01:*:*:*:*:*:*:*", + "matchCriteriaId": "86381B71-DB86-4596-8146-6075E2C1F512" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_455_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D68FE729-B3E9-4356-9B85-D22BF60C27AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_455_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "44F6BF01-ED16-4B7C-A79C-F77B49B2C6FD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_455_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD88F9D7-6108-4108-9685-AB2FB2FF92CA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_630_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "14BC6C99-9B21-4677-BBD7-9A6370E1D8B6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80EF159A-302D-4F73-8A08-683805B051A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_635_aero_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "116229E7-EEF3-47E3-AD85-EA39BBCAC1B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_635_aero_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C52FB94F-8377-41EE-B377-498A560626DF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_640_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "3828FECE-B145-4C0A-853B-F107FE871B24" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6351F53-2458-47FB-B547-C56691B7CF50" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_650_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "6772CEEE-2996-44C5-9C96-AD14EC829ED5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED793F1B-C4A0-41B7-856B-20CF33308750" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_fortis_g10_firmware:01.03.00:*:*:*:*:*:*:*", + "matchCriteriaId": "4A9EE2C2-B4C2-485E-BC96-A1464922F831" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_fortis_g10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "281BD2C3-31EA-45F8-9F2B-6333EB420366" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_fortis_g9_firmware:01.03.00:*:*:*:*:*:*:*", + "matchCriteriaId": "BC7BA69C-5520-487D-9E5C-353710D35F70" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_fortis_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5FE0325-E61F-472C-8129-9ADC1EA7B4D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_x360_11_g7_ee_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "38624BC9-026D-468B-9294-5B086A2FBDA7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_x360_11_g7_ee:-:*:*:*:*:*:*:*", + "matchCriteriaId": "259B2C81-4B86-4DDD-B678-3E8F107432FF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:probook_x360_435_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "1A0CA4AF-1A56-4432-9815-29E81B1CF634" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:probook_x360_435_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B66E7EF7-4642-4492-9481-9BF8BDA584C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:zbook_firefly_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "5B619E85-404C-482A-B5FE-E052D9855AE6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:zbook_firefly_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E1E7702-C774-43B5-B7F7-0A0D27433622" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:zbook_firefly_g9_firmware:01.03.01:*:*:*:*:*:*:*", + "matchCriteriaId": "9FEABF25-C2D4-45B8-9221-503E5AD355A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:zbook_firefly_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CFD8AB2-83FA-42D9-A848-E6BE69394671" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:zbook_firefly_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "5B619E85-404C-482A-B5FE-E052D9855AE6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:zbook_firefly_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E1E7702-C774-43B5-B7F7-0A0D27433622" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:zbook_firefly_g9_firmware:01.03.01:*:*:*:*:*:*:*", + "matchCriteriaId": "9FEABF25-C2D4-45B8-9221-503E5AD355A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:zbook_firefly_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CFD8AB2-83FA-42D9-A848-E6BE69394671" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:zbook_fury_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "37EDC561-A780-4F32-922E-13B9A4FEAE17" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:zbook_fury_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42823BAF-7706-4EE5-B67F-756C4FA1285A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:zbook_fury_16_g9_firmware:01.03.02:*:*:*:*:*:*:*", + "matchCriteriaId": "18FAAE58-48CB-49B6-83C8-1C7CB5E7F669" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:zbook_fury_16_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7EA5CA03-5990-4EAF-BFE4-1EF0CAC3978C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:zbook_fury_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "37EDC561-A780-4F32-922E-13B9A4FEAE17" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:zbook_fury_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42823BAF-7706-4EE5-B67F-756C4FA1285A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:zbook_power_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "65F3B5B4-A863-4D49-82CF-89F990E22D45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:zbook_power_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59EDA0AC-5F7E-49DB-A618-91CCEDA02FC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:zbook_power_g9_firmware:01.03.00:*:*:*:*:*:*:*", + "matchCriteriaId": "B3743E7B-78A9-431A-AF42-C44735A9740D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:zbook_power_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39C8614A-6729-44E3-9DA4-095F02B111B5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:zbook_studio_g8_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "F00E36E3-FD0E-4D7A-BE91-1E72108687D0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:zbook_studio_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1492ED88-CD51-49D7-B1E0-8811A0A75E74" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:zbook_studio_g9_firmware:01.03.01:*:*:*:*:*:*:*", + "matchCriteriaId": "8D714D89-4AA7-4945-8497-E59F8C752643" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:zbook_studio_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05F69127-005C-4072-80A8-39CC691B9A0E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:zhan_66_pro_g5_firmware:01.04.00:*:*:*:*:*:*:*", + "matchCriteriaId": "08C62652-E5A7-4515-A41C-E8EA0EC602A5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:zhan_66_pro_g5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCF2167D-F5F7-4D8C-B77B-96BFD93E718F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:zhan_66_pro_a_14_g4_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "1DB9CFF3-3DAA-4881-B477-32F44BC9FA2A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:zhan_66_pro_a_14_g4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3866AB2F-8161-44CA-BF2E-07FE001328A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:zhan_66_pro_a_14_g5_firmware:01.08.01:*:*:*:*:*:*:*", + "matchCriteriaId": "F6349AC8-C818-44CB-8DD0-F62299B9CF68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:zhan_66_pro_a_14_g5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "64D5E785-48C0-477D-ACA5-BAB29E4C3991" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elite_mini_600_g9_firmware:02.05.00:*:*:*:*:*:*:*", + "matchCriteriaId": "CF60E54F-5959-4944-BDA5-B01AE42591BA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elite_mini_600_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A786577-CFE2-45FE-8145-D96C8DE6A951" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elite_mini_800_g9_firmware:02.05.00:*:*:*:*:*:*:*", + "matchCriteriaId": "9D64E312-826B-4062-80F1-6E608412DCE3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elite_mini_800_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0BB3F65B-0793-4E3F-AA4A-0FC9FE142133" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elite_sff_600_g9_firmware:02.05.01:*:*:*:*:*:*:*", + "matchCriteriaId": "EB20EDFF-8CB4-407D-AF07-61577D38382A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elite_sff_600_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "810D39EE-98E2-4191-B1F2-E92D8E03D97F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elite_sff_800_g9_firmware:02.05.01:*:*:*:*:*:*:*", + "matchCriteriaId": "BA879CAA-6A91-4FD4-B29D-6B3C5EA51385" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elite_sff_800_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17E812CF-E354-40F0-B10E-1CCDBFAB8CAB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elite_tower_600_g9_firmware:02.05.01:*:*:*:*:*:*:*", + "matchCriteriaId": "39C82346-1A7D-4B41-8B68-CDECDAF5B4AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elite_tower_600_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70CC5F72-3BC9-4FA2-B7A6-36CD392C0F8A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elite_tower_680_g9_firmware:02.05.01:*:*:*:*:*:*:*", + "matchCriteriaId": "4B21AB32-9548-415B-9288-3F6A14914F38" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elite_tower_680_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0F4B5FB-0C8F-4A10-A7D7-229E09B686E7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elite_tower_800_g9_firmware:02.05.01:*:*:*:*:*:*:*", + "matchCriteriaId": "49461379-9D56-428B-8FE7-02743C50B791" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elite_tower_800_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DDDBEA3-9E1A-45DC-9CD0-44B0E74CB735" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elite_tower_880_g9_firmware:02.05.01:*:*:*:*:*:*:*", + "matchCriteriaId": "D4BB709B-31F5-40C3-A744-160B875ABEFB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elite_tower_880_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40BD17E5-F0A4-4DAE-96FD-2E57CF96562C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitedesk_800_g8_firmware:02.09.01:*:*:*:*:*:*:*", + "matchCriteriaId": "5AF769C7-B5DC-4A95-B1A3-7E618FE3D3AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitedesk_800_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F1421F5-89CC-483B-B76D-740676C77917" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitedesk_800_g8_firmware:02.09.01:*:*:*:*:*:*:*", + "matchCriteriaId": "5AF769C7-B5DC-4A95-B1A3-7E618FE3D3AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitedesk_800_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F1421F5-89CC-483B-B76D-740676C77917" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitedesk_800_g8_firmware:02.09.01:*:*:*:*:*:*:*", + "matchCriteriaId": "5AF769C7-B5DC-4A95-B1A3-7E618FE3D3AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitedesk_800_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F1421F5-89CC-483B-B76D-740676C77917" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitedesk_805_g8_firmware:02.05.02:*:*:*:*:*:*:*", + "matchCriteriaId": "AD034711-0BC1-456C-A554-50B6C3C6900C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitedesk_805_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1E1B948-73F5-4105-B9E1-0C63DC4BE201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitedesk_805_g8_firmware:02.05.02:*:*:*:*:*:*:*", + "matchCriteriaId": "AD034711-0BC1-456C-A554-50B6C3C6900C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitedesk_805_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1E1B948-73F5-4105-B9E1-0C63DC4BE201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elitedesk_880_g8_firmware:02.09.01:*:*:*:*:*:*:*", + "matchCriteriaId": "94C17712-CE54-4E52-A0CE-5D35A10D02D0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elitedesk_880_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E78D54B-33D3-49A0-BB11-10FBA6877C46" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:eliteone_800_g8_24_firmware:02.09.01:*:*:*:*:*:*:*", + "matchCriteriaId": "4FB45F23-A587-42BE-B1B6-F6989F1B2F0F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:eliteone_800_g8_24:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8FD621B-6BBE-4751-B13C-0783FC9F6136" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:eliteone_800_g8_27_firmware:02.09.01:*:*:*:*:*:*:*", + "matchCriteriaId": "6F34F27E-DEE4-4BB9-A98A-637A149D1E1B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:eliteone_800_g8_27:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A39864FE-E5FA-4A29-857D-D161E6B8EE2B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:eliteone_840_g9_firmware:02.06.00:*:*:*:*:*:*:*", + "matchCriteriaId": "EB0FFEBD-0EB4-4718-8FCF-A85BC6D91593" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:eliteone_840_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5E1EEE22-8E2A-465B-9B41-FE0809916784" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:eliteone_870_g9_firmware:02.06.00:*:*:*:*:*:*:*", + "matchCriteriaId": "9C57A1E3-E10B-4E9D-93B3-61F6B6D22880" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:eliteone_870_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F811B97B-DD3B-43E7-9A56-AF42AD16A08F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:mini_conferencing_pc_firmware:02.05.00:*:*:*:*:*:*:*", + "matchCriteriaId": "6D827F7E-AC12-4967-95CB-E8D396CBADAC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:mini_conferencing_pc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B73ECB6E-DFFF-4FCC-AA64-F3A3CB9C92F8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:pro_mini_400_g9_firmware:02.05.00:*:*:*:*:*:*:*", + "matchCriteriaId": "3888DDF4-D7D3-4CE1-8B13-0D8CF3EA85A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pro_mini_400_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F33FD50E-CF52-4423-9C62-512E228B659E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:pro_sff_400_g9_firmware:02.05.00:*:*:*:*:*:*:*", + "matchCriteriaId": "C52AD354-5853-4348-911D-AA25ED5EA6E9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pro_sff_400_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D30639B5-8CDA-4923-89F4-BC14C59532E7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:pro_tower_400_g9_firmware:02.05.00:*:*:*:*:*:*:*", + "matchCriteriaId": "7D720EC9-D11A-4801-8F51-A9CECED4516D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pro_tower_400_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C655883-292C-458B-A679-F063C06CCA67" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:pro_tower_480_g9_firmware:02.05.00:*:*:*:*:*:*:*", + "matchCriteriaId": "60CEEE3D-7CD9-4B9A-90E1-019B2BA59874" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pro_tower_480_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFEBA395-4A52-42F9-92EC-11D871E131AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:prodesk_405_g8_firmware:02.05.02:*:*:*:*:*:*:*", + "matchCriteriaId": "B22FFFD4-5A42-4FA5-A6B8-E79725BD2423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:prodesk_405_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16D5044F-BBBA-4D9B-AACA-3F513CEF65E8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:prodesk_405_g8_firmware:02.05.02:*:*:*:*:*:*:*", + "matchCriteriaId": "B22FFFD4-5A42-4FA5-A6B8-E79725BD2423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:prodesk_405_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16D5044F-BBBA-4D9B-AACA-3F513CEF65E8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:proone_440_g9_firmware:02.05.00:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B3EE94-51DC-4C1A-BA6C-2BFBB03EC24B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:proone_440_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88F51B69-FC10-4D39-8EB3-D45A44CBB6A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:z1_g8_tower_firmware:02.09.01:*:*:*:*:*:*:*", + "matchCriteriaId": "F1BF7420-E482-404A-B1EE-0CB174661AA4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:z1_g8_tower:-:*:*:*:*:*:*:*", + "matchCriteriaId": "875FD00D-4C03-4C29-90FB-5FF32B54BEA8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:z1_g9_tower_firmware:02.05.01:*:*:*:*:*:*:*", + "matchCriteriaId": "3AB95021-DD40-4E63-9C58-730B371DC3A1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:z1_g9_tower:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1D8247A-B608-46F1-9485-F23E425F75AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:engage_go_10_firmware:01.10.00:*:*:*:*:*:*:*", + "matchCriteriaId": "0590F5FF-CF3F-4003-917B-4C523B0BB9EB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:engage_go_10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9939FEC0-618D-4FB1-9391-08BFE9F7A699" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:hp_z2_mini_g9_firmware:01.04.00:*:*:*:*:*:*:*", + "matchCriteriaId": "3DD8CD53-D9A2-43D1-AD2B-E209116F909F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:hp_z2_mini_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28E3E375-C41B-427F-BEB8-FA2DCE80D691" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:hp_z2_small_form_factor_g8_firmware:01.05.02:*:*:*:*:*:*:*", + "matchCriteriaId": "4E5D811D-0507-456E-8DED-BE55FE164C3A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:hp_z2_small_form_factor_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B89AE6F1-7AB0-4BFF-A08F-954CB7677F19" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:hp_z2_small_form_factor_g9_firmware:01.04.00:*:*:*:*:*:*:*", + "matchCriteriaId": "AF93DFB2-26D2-4176-B27C-DD33CB1EFC49" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:hp_z2_small_form_factor_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C954ECA-2AF5-4409-92B9-9401E50208BF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:hp_z2_tower_g8_firmware:01.05.02:*:*:*:*:*:*:*", + "matchCriteriaId": "736C82FC-B965-4EAF-A7B1-889958D64E45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:hp_z2_tower_g8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "790ADD71-5A74-4B0F-8A94-23D70816DE86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:hp_z2_tower_g9_firmware:01.04.00:*:*:*:*:*:*:*", + "matchCriteriaId": "22553BC4-A941-4369-85B8-7D01227C86ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:hp_z2_tower_g9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54279DE4-A2A4-4AA6-A05F-931094446F16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:pro_mt440_g3_firmware:01.05.00:*:*:*:*:*:*:*", + "matchCriteriaId": "4964FFD0-1955-45C1-BB74-BD148505508C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pro_mt440_g3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CD2DA81-481B-4A5A-835F-EE3A37FEE9EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:elite_mt645_g7_firmware:01.10.01:*:*:*:*:*:*:*", + "matchCriteriaId": "CE5544BD-BA8B-4851-9276-E3FBDE8523FE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:elite_mt645_g7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "091A48AF-0E86-4A44-9B73-83BB001F63E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.hp.com/us-en/document/ish_7013183-7013209-16/hpsbhf03812", - "source": "hp-security-alert@hp.com" + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-419xx/CVE-2022-41985.json b/CVE-2022/CVE-2022-419xx/CVE-2022-41985.json new file mode 100644 index 00000000000..de13a537aa3 --- /dev/null +++ b/CVE-2022/CVE-2022-419xx/CVE-2022-41985.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2022-41985", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-05-10T16:15:09.400", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An authentication bypass vulnerability exists in the Authentication functionality of Weston Embedded uC-FTPs v 1.98.00. A specially crafted set of network packets can lead to authentication bypass and denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-303" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/weston-embedded/uC-FTPs/pull/1", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1680", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4568.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4568.json index d577db6c972..3bf911a22d8 100644 --- a/CVE-2022/CVE-2022-45xx/CVE-2022-4568.json +++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4568.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4568", "sourceIdentifier": "psirt@lenovo.com", "published": "2023-05-01T15:15:09.160", - "lastModified": "2023-05-01T20:07:26.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T17:21:47.793", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "psirt@lenovo.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + }, { "source": "psirt@lenovo.com", "type": "Secondary", @@ -46,10 +76,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lenovo:system_update:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.08.01.0005", + "matchCriteriaId": "EE6C7C81-EAE4-4566-9AB5-ECD045B5ED5A" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.lenovo.com/us/en/product_security/LEN-103545", - "source": "psirt@lenovo.com" + "source": "psirt@lenovo.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46377.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46377.json new file mode 100644 index 00000000000..2bcf3da07f7 --- /dev/null +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46377.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2022-46377", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-05-10T16:15:10.153", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no IP address argument is provided to the `PORT` command." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/weston-embedded/uC-FTPs/pull/2", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46378.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46378.json new file mode 100644 index 00000000000..6cefeb758e7 --- /dev/null +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46378.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2022-46378", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-05-10T16:15:10.413", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no port argument is provided to the `PORT` command." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/weston-embedded/uC-FTPs/pull/2", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48482.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48482.json index 005bca5141a..984657c1f19 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48482.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48482.json @@ -2,23 +2,95 @@ "id": "CVE-2022-48482", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-02T05:15:27.407", - "lastModified": "2023-05-02T12:56:18.213", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T17:11:08.560", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "3CX before 18 Update 2 Security Hotfix build 18.0.2.315 on Windows allows unauthenticated remote attackers to read certain files via /Electron/download directory traversal. Files may have credentials, full backups, call recordings, and chat logs." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:3cx:3cx:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0.2.315", + "matchCriteriaId": "4880CCEA-9410-4708-AB16-6EA5FA1A8437" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.3cx.com/blog/change-log/phone-system-change-log/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48483.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48483.json index 41b61a02fc2..aee62ec420a 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48483.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48483.json @@ -2,23 +2,84 @@ "id": "CVE-2022-48483", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-02T05:15:28.057", - "lastModified": "2023-05-02T12:56:18.213", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:53:31.000", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "3CX before 18 Hotfix 1 build 18.0.3.461 on Windows allows unauthenticated remote attackers to read %WINDIR%\\system32 files via /Electron/download directory traversal in conjunction with a path component that has a drive letter and uses backslash characters. NOTE: this issue exists because of an incomplete fix for CVE-2022-28005." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:3cx:3cx:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0.3.461", + "matchCriteriaId": "17EF5885-D9C8-496B-A610-211788AB1B3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://www.3cx.com/blog/change-log/phone-system-change-log/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0007.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0007.json new file mode 100644 index 00000000000..cdda67d143e --- /dev/null +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0007.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-0007", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2023-05-10T17:15:08.910", + "lastModified": "2023-05-10T17:15:08.910", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software on Panorama appliances enables an authenticated read-write administrator to store a JavaScript payload in the web interface that will execute in the context of another administrator\u2019s browser when viewed.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2023-0007", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0008.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0008.json new file mode 100644 index 00000000000..a04c9469ba4 --- /dev/null +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0008.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-0008", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2023-05-10T17:15:09.040", + "lastModified": "2023-05-10T17:15:09.040", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A file disclosure vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator with access to the web interface to export local files from the firewall through a race condition.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2023-0008", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1526.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1526.json index 2cfedb7f2ac..1ba5b92c50e 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1526.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1526.json @@ -2,19 +2,333 @@ "id": "CVE-2023-1526", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-04-28T17:15:42.973", - "lastModified": "2023-04-28T17:43:00.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:47:44.507", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Certain DesignJet and PageWide XL TAA compliant models may have risk of potential information disclosure if the hard disk drive is physically removed from the printer." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:designjet_z6_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "jgr6_09_22_51.2", + "matchCriteriaId": "79275045-E680-4980-AE2E-E4B4FF2F9EF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:designjet_z6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AC21A58-00BA-4EDF-9EF0-870AE44D218B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:designjet_z6dr_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "jgr6_09_22_51.2", + "matchCriteriaId": "D98922E6-9D13-499C-BD28-E6FE2BC60327" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:designjet_z6dr:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9830F6D2-A1EF-48D9-A9FE-EF4F3CC37A9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:designjet_z9_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "jgr9_09_22_51.2", + "matchCriteriaId": "DF1E5F8A-53F4-4575-B647-21FE43BD81D6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:designjet_z9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8876C93-02EA-4AB0-BD3E-E73C5293BD74" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:designjet_z9dr_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "jgr9_09_22_51.2", + "matchCriteriaId": "FBB204FE-BCF4-49E4-B86B-D8DAC3B65174" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:designjet_z9dr:-:*:*:*:*:*:*:*", + "matchCriteriaId": "944C8DAB-1262-4D78-943E-BE43FCA7AF86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:designjet_z9\\+_pro_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C5038AB0-6D73-4CC3-9790-82BADDBF48A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:designjet_z9\\+_pro:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3B5271B-CA09-45EB-BE82-5573E15BCB7B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:pagewide_xl_4700:_firmware:-:*:*:*:*:*:*", + "matchCriteriaId": "9E35992F-797A-4210-AD84-B73119A8119D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_xl_4700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD7EFD29-61E5-44DD-BF9E-E7A94C7518D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:pagewide_xl_4500:_firmware:-:*:*:*:*:*:*", + "matchCriteriaId": "59D4C8D4-634D-4328-BADA-586D0DB774B5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_xl_4500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C79CA733-FC8F-409E-B7F5-17C62C352C07" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:pagewide_xl_4100:_firmware:-:*:*:*:*:*:*", + "matchCriteriaId": "F336F37C-C59F-48C4-884A-6EEFE2CEDBAE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_xl_4100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8176BFFE-C208-4E5C-9D68-666A747D84B2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:pagewide_xl_4600:_firmware:-:*:*:*:*:*:*", + "matchCriteriaId": "8D0C17BB-2F0F-4AD9-9C53-BE5F07D4817A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_xl_4600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B438074-4FBD-4167-8B49-E632088108B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:pagewide_xl_8000:_firmware:-:*:*:*:*:*:*", + "matchCriteriaId": "724920B8-F956-457F-9CBF-0F0620AC4630" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_xl_8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9889CAC-98CE-48D8-B49B-BAB37CC8AFC2" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.hp.com/us-en/document/ish_7869666-7869691-16/hpsbpi03837", - "source": "hp-security-alert@hp.com" + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24958.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24958.json index 174f03fa763..cd5a7bb74ac 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24958.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24958.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24958", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-05-04T14:15:10.173", - "lastModified": "2023-05-04T18:45:32.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:20:12.727", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "psirt@us.ibm.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,14 +76,138 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:3957-vec_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.51.0", + "versionEndExcluding": "8.51.2.12", + "matchCriteriaId": "B197CD8D-54E2-484B-8738-76023E622849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:3957-vec_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.52.100.0", + "versionEndExcluding": "8.52.102.13", + "matchCriteriaId": "E066D44A-254C-411A-B1DD-4A5CDA4158CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ibm:3957-vec:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA5AFD00-4476-4F6D-B94B-CC5DC0AFFA85" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:3957-ved_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.51.0", + "versionEndExcluding": "8.51.2.12", + "matchCriteriaId": "980CFAB9-3673-4204-92C0-ED354DCAE690" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:3957-ved_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.52.100.0", + "versionEndExcluding": "8.52.102.13", + "matchCriteriaId": "C14361A3-98BE-4EC9-8F7C-5B12613AA4B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:3957-ved_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.52.200.0", + "versionEndExcluding": "8.52.200.111", + "matchCriteriaId": "25F7347A-BA05-4798-ABBC-8DEA7828DCFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:3957-ved_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.53.0", + "versionEndExcluding": "8.53.0.63", + "matchCriteriaId": "1999ACE8-40C7-4D9E-837A-E53C44F7A6E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ibm:3957-ved:-:*:*:*:*:*:*:*", + "matchCriteriaId": "224332D9-31A8-4EF3-B675-29783295E98F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:3948-ved_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.53.0", + "versionEndIncluding": "8.53.0.63", + "matchCriteriaId": "D76A6F44-751C-49D0-8834-2369F7B7A285" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ibm:3948-ved:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B531AEEC-2838-4A21-92B4-90BA2D06D1BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/246320", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/6980845", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26010.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26010.json index 50f5768fc5b..eecad3236c3 100644 --- a/CVE-2023/CVE-2023-260xx/CVE-2023-26010.json +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26010.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26010", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-04T14:15:10.593", - "lastModified": "2023-05-04T18:45:32.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:19:04.733", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmobile.app_project:wpmobile.app:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "11.19", + "matchCriteriaId": "341A09B9-2659-4E52-8B13-10A2764A4652" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wpappninja/wordpress-wpmobile-app-android-and-ios-mobile-application-plugin-11-18-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26012.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26012.json index 33eabdf7a92..dc953ceaf11 100644 --- a/CVE-2023/CVE-2023-260xx/CVE-2023-26012.json +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26012.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26012", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-04T14:15:11.090", - "lastModified": "2023-05-04T18:45:32.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:18:12.210", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:custom_login_page_project:custom_login_page:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.0", + "matchCriteriaId": "D0CE5D52-D87F-4E10-BE10-5619F2ABD2BB" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-custom-login-page/wordpress-custom-login-page-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26268.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26268.json index 68700a4c7db..8bd98cb2d3a 100644 --- a/CVE-2023/CVE-2023-262xx/CVE-2023-26268.json +++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26268.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26268", "sourceIdentifier": "security@apache.org", "published": "2023-05-02T21:15:09.233", - "lastModified": "2023-05-03T10:33:46.147", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:08:34.207", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "security@apache.org", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "security@apache.org", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security@apache.org", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,18 +76,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.3", + "matchCriteriaId": "78AD8F98-C0F4-423D-875B-B34A8AEB82C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3.0", + "versionEndExcluding": "3.3.2", + "matchCriteriaId": "1969B512-C576-47F3-86A2-A916AC792508" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloudant:*:*:*:*:*:*:*:*", + "versionEndIncluding": "8349", + "matchCriteriaId": "CA26A222-7576-432C-915E-F1FC87AE4751" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.couchdb.org/en/stable/cve/2023-26268.html", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread/ldkqs0nhpmho26bdxf4fon7w75hsq5gl", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread/r2wvjfysg3d92lhhjd1qh3wfr8mlp0pp", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2629.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2629.json new file mode 100644 index 00000000000..72ee6d9241b --- /dev/null +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2629.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-2629", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-05-10T16:15:10.660", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Formula Elements in a CSV File in GitHub repository pimcore/customer-data-framework prior to 3.3.9." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1236" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/pimcore/customer-data-framework/commit/4e0105c3a78d20686a0c010faef27d2297b98803", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/821ff465-4754-42d1-9376-813c17f16a01", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2630.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2630.json new file mode 100644 index 00000000000..bad9defd177 --- /dev/null +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2630.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-2630", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-05-10T16:15:11.157", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/pimcore/pimcore/commit/7e32cc28145274ddfc30fb791012d26c1278bd38", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/e1001870-b8d8-4921-8b9c-bbdfb1a1491e", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27892.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27892.json index 8cd522ee2f3..71062d15f6b 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27892.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27892.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27892", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-02T21:15:09.337", - "lastModified": "2023-05-03T10:33:46.147", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:07:16.483", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.2 + }, { "source": "cve@mitre.org", "type": "Secondary", @@ -34,14 +54,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:shapeshift:keepkey_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.5.2", + "versionEndExcluding": "7.7.0", + "matchCriteriaId": "A1C9272A-8363-487C-909D-4D7E7A1929D4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:shapeshift:keepkey:-:*:*:*:*:*:*:*", + "matchCriteriaId": "663CE48F-F657-40AA-8954-EADA31C9DFB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.inhq.net/posts/keepkey-CVE-2023-27892/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/keepkey/keepkey-firmware/pull/337", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29057.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29057.json index c1340a50fed..696518f6ba1 100644 --- a/CVE-2023/CVE-2023-290xx/CVE-2023-29057.json +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29057.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29057", "sourceIdentifier": "psirt@lenovo.com", "published": "2023-04-28T21:15:08.673", - "lastModified": "2023-04-28T22:22:40.580", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:09:19.657", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@lenovo.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "psirt@lenovo.com", "type": "Secondary", @@ -46,10 +76,3156 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx5530_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "46A578A7-5436-4B92-9860-75F637C2F12B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx5530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C62BC05D-7619-41CC-88F7-90EBC242A15F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx7530_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "6458E729-5B4D-4BF8-AC84-A73FA849A76B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx7530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "330331CB-6EF1-4263-B579-11E990C85F93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx3331_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "D9F1172B-8113-4B8C-8455-86B10115E94C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx3331:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBCFFB6F-C269-425B-AD66-9000BBC5DAE4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx_enclosure_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "BB1D00C0-21CC-430E-822C-4E13B65D0880" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx_enclosure:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2C22D09-B948-4EEE-9CEA-DAD0D8BE370E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx1021_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "2FE708B8-65A8-497D-93EF-322579CE3651" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx1021:-:*:*:*:*:*:*:*", + "matchCriteriaId": "536A78A4-9C58-400F-AFBB-73186A0D3FDC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx1320_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "EA6FC032-324D-4FDC-8C74-D9CF82797334" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx1320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E72B2526-8BD9-49FD-BDCF-B654BCEAC8AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx1321_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "E98CCEAA-3A3C-4087-93B1-6DE7995113A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx1321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADFD8C5A-D9E0-4EFF-92A3-17A6DBE7D155" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx1331_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "142D1A60-2F5D-457B-92B7-59595F034765" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx1331:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DD11357-E276-44E5-B825-F948D5A757CD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx1520-r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "CD6712D8-253F-4952-AB21-BBFA54BF822C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx1520-r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "648DD614-F500-4FFB-8FD4-D2B284FE5E55" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx1521-r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "688CFB0E-2095-4CE2-8CA4-E8BD32578F91" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx1521-r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D33A804F-C94C-4A6C-AA84-957834680652" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx2320-e_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "0659AED4-D4E5-4FB4-8B31-550AF9F88893" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx2320-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DECFCE59-8456-47A3-8A8E-989813E37674" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx2321_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "15BD47D1-90E7-4FC8-879D-E0EA9F72459A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx2321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5E515C4-D2F2-4A71-9A9C-70A80477352A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx2330_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "05CA0D28-CD71-4BDA-82B5-4528E68AEB8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx2330_firmware:2.93_afbt30p:*:*:*:*:*:*:*", + "matchCriteriaId": "2A825FF4-4686-4059-B291-64FB5AEBB866" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx2330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE6D9490-0456-4C77-867C-21339F52D19E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx2331_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "B915F44E-73A7-4DAF-9B2C-FEFACB62FB13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx2331:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA8CBCB0-7152-4FD0-A50E-280C42BB4B5E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx2720-e_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "4522BB27-A943-4188-B1C4-FA3CC0D2987C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx2720-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2574C115-7511-422C-9383-D09B021B4946" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3320_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "8363826A-2858-46AA-98E5-5C89EA581CFA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03D3EBE9-34C1-45CA-A800-B313110409DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3321_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "F734FE11-80B5-494F-BE28-8FB4AA00963A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86E6A2F7-7EC0-46E1-A973-2172B076E883" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3330_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "3D9FC871-32D4-400C-A1A3-BEB5D2C08204" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A30DA25-C17B-49A4-A5B5-21BC45C322C4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3331_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "8EFC6D85-7FCE-4D68-84A9-3F155F0C8244" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3331:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D66A9798-71F6-4884-AFC7-A695A713576A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3331_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.71_d8bt48p", + "matchCriteriaId": "F9E5F98C-2B3E-4434-91BE-9CC19832A527" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3331:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D66A9798-71F6-4884-AFC7-A695A713576A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3375_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.71_d8bt48p", + "matchCriteriaId": "9D8B787A-EF21-4EF8-A75E-E187C0F18E2C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8126219-A07C-42A6-9553-B6AE499DB6BF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3376_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "BEE6A10B-6BCA-4D66-928B-38CF142EBF19" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3376:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57D7A545-BE29-4F0B-AC77-8E6DE955CA5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3520-g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "32D2C9D3-D5AE-4DA4-AFF1-6F0FAC642F51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3520-g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D354C3-0183-42D9-97D0-C9888B023195" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3521-g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "857D7014-C3E6-478C-BF9C-82169315B351" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3521-g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E0DDCC8-46B7-43FA-8A4A-BCE8AB7F8480" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3720_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "D1E8FF43-8C7A-4354-9721-FB977104ECF4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3720:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C38326D-97DD-4A6B-985F-968570528C19" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3721_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "27FBBDA1-52E7-4B14-AFA5-9263739232C5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3721:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CCDE6B9-6505-4E44-A444-C4C3A054B5F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx5520_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "4DBC989B-CB17-4BCC-9FDE-AE6C550698C4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx5520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A9FDCC0-F45C-4AA1-BB11-0761A25BF16B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx5520-c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "9C19F289-5F84-4395-BEF1-F5DA7AED2DB3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx5520-c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EB95DEC-D622-4AD7-AC69-077A94BD752C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx5521_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "D0777AEE-1F2E-40B4-9AA6-4782AAE940A5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx5521:-:*:*:*:*:*:*:*", + "matchCriteriaId": "924C1B4B-6E97-4942-8000-BB59860913EE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx5521-c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "4239FD66-7A2E-40E2-B953-1EC32C208024" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx5521-c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5788FFBD-69B4-4FB6-A2D2-4C6BA6CCE769" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx5531_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "A1B8C4D2-C786-49B4-9B13-6975542D7504" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx5531:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FAEAB68-0F17-45BD-B0B9-0C5FD5BBE2AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx7520_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "DB1BAE65-812F-4B21-A4A0-060243B45B72" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx7520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16776C5F-CCAF-4F22-B570-FE49A0B73FF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx7521_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "94311D5A-15B6-43A9-9030-092421C591BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx7521:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F350D6FE-7BE1-46C9-B1A6-4EE0AF8BCB55" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx7530_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "6458E729-5B4D-4BF8-AC84-A73FA849A76B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx7530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "330331CB-6EF1-4263-B579-11E990C85F93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx7531_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "5154CD2F-AD5C-45D8-BDDF-3E57499A62B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx7531:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DD32840-AF55-49C1-A8B4-A4D3B0F85B45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx7531_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.75_psi348s", + "matchCriteriaId": "E6A3E984-CE12-4694-BE64-FAC6478C0F38" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx7531:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DD32840-AF55-49C1-A8B4-A4D3B0F85B45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx7820_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.75_psi348s", + "matchCriteriaId": "F611877D-BE44-4937-8341-A00EEBD4E870" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx7820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA2540A2-1462-42F7-949C-9881544DE684" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx7821_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "1D2C5786-2B7B-4F04-AFC2-51C6EF62DA7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx7821:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E153D62-9443-4F52-BA47-5C2704E05BC9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx1020_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "5BE64E31-8CD0-431E-BEDC-F23A31DBA009" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx1020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF0E5EF6-2664-4DEC-BD90-BF3128DC9DA6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx3330-f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "68A20D8C-90CC-436E-8125-C471C5C41261" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx3330-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "308EAB87-EF05-487F-B5AA-4D7E58937BB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx3330-h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "813A389B-F55B-4B16-A67D-AC565228AE4B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx3330-h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1387DB10-2478-41E8-937A-98012A5FAB6F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx3331-f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "BA3EBCAA-0456-4DC8-834F-FDFCB3A41240" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx3331-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2EB352F-AFEB-433D-84A3-5C849B658647" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx3331-h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "FC2F4A4F-C30B-4322-8E54-159E83027FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx3331-h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CC19B72-13E8-4F13-89AC-2112FC6EE809" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx3530_f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "1947D638-A324-483D-BC37-5AB3B345935B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx3530_f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B55863D2-D2A9-4BFC-9560-2E0DF99388C0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx3530-h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "747BF99D-6B3A-4954-B99E-107E55F828A1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx3530-h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E740BCC-B3FF-4A6E-B9CD-0D13FAE1D9FE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx3531_h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "65611366-BA40-4064-B617-9320BA705C7A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx3531_h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF566DC8-C3A9-49AF-8B9C-C4FB8D94A7F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx3531-f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "89CD08E6-5746-495B-A9E1-DF8F7A7BE347" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx3531-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0F87CEA-8200-4345-9804-693D5B8F98A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx1021_on_se350_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "6B7FF257-18D2-4543-8C5A-E37116DC28FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx1021_on_se350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FA103E0-C6DC-4D57-8538-6AA71E6CEF99" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx_1se_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "C23661E8-A862-4ACC-9B71-07C0DEC1BBB1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx_1se:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FEBC1C9E-C548-4881-817B-109943BEA02F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx_2u4n_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "E93D0BA3-1BA9-456E-856E-C33E247C5504" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx_2u4n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B5DD2F7-6D91-42A5-827D-9A44F319CB01" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx_4u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.75_psi348s", + "matchCriteriaId": "CB958079-C9EC-45DE-B00B-46415BA1622E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx_4u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33D2593D-E1D1-4C4F-884A-5E877E92C715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx1320_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "6B6F3B7E-020F-434E-B783-8F99AE03A321" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx1320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D11E00E8-4234-401D-8A0E-6EC1A15F44BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx2320_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "AFE27D87-68EC-430A-81D4-26CD3FF32C59" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx2320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF7500A0-B95E-4E16-B532-28C139C94AF3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx2330_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "2CE03063-DDCF-41C3-8E87-AF633EC1EF5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx2330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCDB5BE9-76C0-4708-805E-6DA37E91648F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx3320_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "71B491BF-9E31-4F61-99CE-1CC56674307C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx3320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A8B3E93-970D-4B49-B5A6-6BFAC45BAAC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx3330_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "E3A5670D-01D2-470A-8FB7-7C671262EA4B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx3330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F449A0D-B2EA-4747-BA7E-88CD4371220C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx3520-g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "BB7F61E0-643F-4DB1-9443-64419C6E24A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx3520-g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72422C47-0027-4B4E-9C82-78FE8A8A6D75" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx3530-g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "C3B6116B-60E4-4812-AE59-3077C6F2DC54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx3530-g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E73BA833-D02E-4274-ABF7-8F1D41815AB3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx3720_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "D4B2AF5E-FBA2-4849-A8AF-DABF740EF58F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx3720:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE87366A-7CDB-46B7-AB89-7839D41B7E25" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx5520_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "CCB8C97C-EA12-43B8-9045-4880407C1DC1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx5520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704A1043-7626-412C-8666-9088B3AA1147" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx5530_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "399D2889-4FB6-4905-880D-7CB54FF3026B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx5530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81BDD8F1-B6B4-48D9-854F-9BFE19CD2B94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx7320_n_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "8521B23A-3D81-44EE-822D-29CD56DB1B72" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx7320_n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "435794D6-7773-4D93-96E2-7269EB863A04" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx7330_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "F5045D7C-7A21-46D3-B134-D98EC417C0EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx7330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "166A619E-C222-4169-8A68-8E718BE27355" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx7520_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "047ECA24-3DF5-40D3-ABC4-1ED5FF7B71E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx7520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E25483F5-F222-42AF-ACA4-580CD2965C55" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx7520_n_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "5657C581-5228-4682-B7DD-CD80E3FC257A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx7520_n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C923CF1-EB97-431F-9D85-0CB5C921A040" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx7530_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "DE4798E2-B3C8-4403-B17C-4E625DC44A37" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx7530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDD5438A-321C-4C7E-9170-C80DA27F9271" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx7531_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "CC0BBC40-968C-42C2-9E04-0815105D8042" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx7531:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6DC1F2D-AA5A-49D4-A0FD-491B1938406F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx7820_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.75_psi348s", + "matchCriteriaId": "F109BF72-D7BB-461A-AA30-E76935BA609D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx7820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E690D37-4DFD-477A-B159-C31D50215C90" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkedge_se450__firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.60_usx324o", + "matchCriteriaId": "B86C0C5D-4B78-4D27-A05E-8BD86A70ED5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkedge_se450_:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8F49BD4-9119-4557-826A-7281C23F484D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkstation_p920_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "9EA34703-1E2C-4176-8709-605E4F2A02DC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkstation_p920:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D47FCAA7-B33F-4F00-85BA-AA8ED4790572" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sd530_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "B991E62F-B51F-4099-898A-77163DECC89D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sd530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2588DA2E-6E58-4FA2-9AA6-FC669C042197" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sd630_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "445A9ABC-DE1D-44A6-9923-AB40FD0805FD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sd630_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "123E924B-D00B-4B9F-B890-1EF670D16F45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sd650_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "F361E67B-3AF7-45A4-9706-89FC6E334FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sd650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A1FF5D0-CC08-42B0-9798-55ED911B3EF6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sd650_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "DC2DA420-0751-4277-8A1F-5B91F28E12A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sd650_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4729C86-050B-4C6B-96F2-7C60AC3086B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sd650-n_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "B7366A53-32BD-4E02-9279-7753A450341B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sd650-n_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2E11CA6-2B14-4F2F-A6D3-A3F3A0199FAD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_se350_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "8F3136AC-3E8C-4656-8F39-297318ED0A92" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_se350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD4B877C-8D19-4AD2-948D-ADBD9B1BEEED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sn550_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "7432CA66-F205-468A-907A-38D1D682A52A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sn550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DB64709-93BA-43D8-A1DB-4CE405291430" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sn550_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "0D45F7DC-29BD-4B69-AA74-49C02932176B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sn550_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2728329-AC98-4AB6-B448-C1B203027593" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sn850_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "366829A3-C06E-487D-8A19-B4E0BA89A1D0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sn850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1DB0C393-2CB4-485F-93E2-2F28B19F9325" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr150_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "E5071012-4ACA-49B4-B2E4-CF58EFCF3F3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6334030-07E4-45F4-A233-4A37F77FC573" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr158_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "5DA538D2-D68F-4A81-9542-D16D9B9CDDBD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr158:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D94182EE-10FE-4506-BDE0-06F4140923FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr250_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "B040A2F8-14A4-4771-825C-4DFE8373BFC6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C5B52AC1-714E-4217-8599-80D99E0D33B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr250_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "2DEFAAB8-2DA6-43FF-BC68-56B55896DEDD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr250_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "071805DB-3A2D-4280-8774-08374DF4CD93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr258_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "3AB2F675-A323-4FD5-AD9E-5043FC7C54CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr258:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB19D273-4975-4957-AE94-117B607CD746" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr258_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "3F7C1851-4290-4F17-9AAD-2F7405CEDC0F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr258_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "466F8F21-C0F8-45CF-9C02-57FBE489645F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr530_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "A60174DF-78B5-4386-A6AC-93056F9C8A4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4C6628A-8A99-4841-A7C5-0445A03C638D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr550_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "335F4367-870F-46FE-B386-99963D299D02" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D10850BF-A7EA-4B84-B2EF-66DCCC301514" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr570_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "796B8297-3696-47B7-AFF3-208673BEC73D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A7C5BE3-5429-46B0-B0B5-C86A9B6376A7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr590_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "549082C5-9A49-47A7-B8F5-A021205189C8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3DC615C-A88A-4C45-892F-77C5E84104E8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr630_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "E9B558D7-23FD-4717-B125-9334740E89C9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr630:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D7F10C8D-C9C7-4FAD-980D-7A602C8BE81D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr630_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "9FD2C32D-CE92-4267-B721-4E6BA3BCEBEF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr630_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF029E34-9819-404D-BEBC-F540590EE8FD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr645_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.71_d8bt48p", + "matchCriteriaId": "96A0115D-E62B-45A5-9BEE-62A9596D315D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr645:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE27586B-1CC9-42A3-B763-93972E204A6D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr645_v3_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.71_d8bt48p", + "matchCriteriaId": "C7D7FA8D-4AB6-45C1-A6D0-130F87B14DB5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr645_v3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A3665C4-48C2-4050-916C-AEA0FAF30784" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr650_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "1C5D57E5-C539-4D7B-A32A-E54E7FF5B408" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6C2B5BB-6E1F-4E01-AAE8-A8239AB8945E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr650_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "5A75C9E8-7B9F-4343-B743-BD24A6F72C7A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr650_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D85AE20-A6A9-48E4-8CAD-537B87730867" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr665_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.71_d8bt48p", + "matchCriteriaId": "37F155A4-AB0C-443E-B8ED-45267CF704ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr665:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AE69184-CA94-4A27-AFF2-3B1B81D25CBA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr665_v3_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.71_d8bt48p", + "matchCriteriaId": "33898282-91C7-4365-86FF-D71336250153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr665_v3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "863C2705-D987-47B7-AA38-8222803CD83A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr670_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "70EFB884-36E2-4CDA-8836-65EEFB531CA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF1664DE-A6AE-4365-A652-80CEFECB62DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr670_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "C7A54480-EB88-4DE9-8C30-417BCD8D06FA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr670_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E97E5B4D-0E6F-49B0-8466-54A818517965" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr850_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "E4D79679-9E6C-453B-B4F8-195D0AE62A5B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19771143-D5F1-4F2F-AB83-09913894681E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr850_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "51B4C248-04B6-4B4F-A0CB-021C43DFB933" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr850_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F4710B7-E7EF-47A2-9585-8B6586FE036C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr850p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "ADF44750-740F-44C3-82A7-1A8908A571AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr850p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A833BF2-DD7B-4A09-AAB8-14C0C7C5DE10" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr860_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "78DE24D8-BE6C-4776-85C6-B30EA84F1EDA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr860:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAF08144-ECCB-477B-A934-E4578522BFEE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr860_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "616885E2-3714-4C4F-B881-441DAA40BF4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr860_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81D22E89-BE6A-4664-8E5B-7DB06DF9B553" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr950_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.75_psi348s", + "matchCriteriaId": "AD750E19-509E-4C9E-BDE0-D0CA8EF1F6C4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6B0407D-D603-48AE-9A42-F4C68056E19D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_st250_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "9FDBF980-D496-44AC-B7AF-E1FBD0BFEC9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_st250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBF2350D-34B1-44DB-8E4A-6F29B37D96CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_st250_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "DB77AEB0-D4A9-4987-B3A0-8F32FB38935A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_st250_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A83C7C5-8716-4C2F-A940-8F594DB106A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_st258_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "04A90DDE-C19D-47B2-B3C4-A76D82ED39E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_st258:-:*:*:*:*:*:*:*", + "matchCriteriaId": "089F97B1-FEDE-4A5D-91D3-0517E8D39174" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_st258_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "FE973C76-76AA-4DC9-8155-0497E8BD8C5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_st258_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "31BF1FFA-1627-4F21-A9BC-8D3399681DBA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_st550_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "13E3631D-714F-493E-8C1F-059F17A776EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_st550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5B19107-5B45-4E45-8B34-90B5A1FF3962" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_st650_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "AF3840B6-84D3-493A-B635-EF9E937BC8E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_st650_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "968449F6-73F2-42C9-A3F4-3116408970F8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_st658_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "ABC96406-9E8F-497F-BA52-E1E0777F9189" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_st658_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F32794E-362A-4A0B-8B13-95F42AA470CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.lenovo.com/us/en/product_security/LEN-118321", - "source": "psirt@lenovo.com" + "source": "psirt@lenovo.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29827.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29827.json index db7625201f3..3c20d8f560c 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29827.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29827.json @@ -2,19 +2,76 @@ "id": "CVE-2023-29827", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-04T14:15:11.363", - "lastModified": "2023-05-04T18:45:32.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:17:45.330", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "ejs v3.1.9 is vulnerable to server-side template injection. If the ejs file is controllable, template injection can be implemented through the configuration settings of the closeDelimiter parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ejs:ejs:3.1.9:*:*:*:*:node.js:*:*", + "matchCriteriaId": "E8921287-EB45-45B3-AFF2-93475E23B503" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mde/ejs/issues/720", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29856.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29856.json index dbe044a7bdb..8badd10a91b 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29856.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29856.json @@ -2,23 +2,93 @@ "id": "CVE-2023-29856", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-02T15:15:23.697", - "lastModified": "2023-05-03T10:33:50.897", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T17:26:57.547", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-868L Hardware version A1, firmware version 1.12 is vulnerable to Buffer Overflow. The vulnerability is in scandir.sgi binary." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-868l_firmware:1.12:*:*:*:*:*:*:*", + "matchCriteriaId": "E12017CD-9CA6-436F-8749-42A0C0422F05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-868l:a1:*:*:*:*:*:*:*", + "matchCriteriaId": "0D8A8303-F830-477F-8944-F1149A0CD521" + } + ] + } + ] + } + ], "references": [ { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10325", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dlink.com/en/security-bulletin/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29867.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29867.json index 238190308b1..89119bae1da 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29867.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29867.json @@ -2,19 +2,76 @@ "id": "CVE-2023-29867", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-02T16:15:08.923", - "lastModified": "2023-05-03T10:33:50.897", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T17:26:40.840", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Zammad 5.3.x (Fixed 5.4.0) is vulnerable to Incorrect Access Control. An authenticated attacker could gain information about linked accounts of users involved in their tickets using the Zammad API." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3.0", + "versionEndExcluding": "5.4.0", + "matchCriteriaId": "3045D03D-6898-46CE-B824-63371B30D621" + } + ] + } + ] + } + ], "references": [ { "url": "https://zammad.com/en/advisories/zaa-2023-02", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29994.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29994.json index 642c231d4b3..a7980e96ef1 100644 --- a/CVE-2023/CVE-2023-299xx/CVE-2023-29994.json +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29994.json @@ -2,19 +2,75 @@ "id": "CVE-2023-29994", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-04T17:15:13.577", - "lastModified": "2023-05-04T18:45:32.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:03:43.517", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In NanoMQ v0.15.0-0, Heap overflow occurs in read_byte function of mqtt_code.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emqx:nanomq:0.15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4383F876-3079-4AC1-A4A9-AE5719B1A077" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/emqx/nanomq/issues/1042", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30024.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30024.json index af8a0d98731..3b252f6c4bf 100644 --- a/CVE-2023/CVE-2023-300xx/CVE-2023-30024.json +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30024.json @@ -2,31 +2,109 @@ "id": "CVE-2023-30024", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-28T13:15:13.920", - "lastModified": "2023-04-28T14:11:00.307", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:12:16.157", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Insecure Permissions vulnerability found in MagicJack A921 USB Phone Jack Rev 3.0 v.1.4 allows a physically proximate attacker to escalate privileges and gain access to sensitive information via the NAND flash memory." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:magicjack:a921_firmware:1.4:*:*:*:*:*:*:*", + "matchCriteriaId": "F592B448-BD06-4720-A6E9-316E461F359D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:magicjack:a921:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0660D42E-A7E4-431C-92AB-518DA02DE191" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/drive/folders/1cKd8hksThK610GPtBQ3du8DEkwKywlAi?usp=sharing", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://pastebin.com/raw/irWcawp8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://samuraisecurity.co.uk/red-teaming-0x01-click-rce-via-voip-usb/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://www.magicjack.com/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-303xx/CVE-2023-30351.json b/CVE-2023/CVE-2023-303xx/CVE-2023-30351.json new file mode 100644 index 00000000000..a3fc5a2dcd9 --- /dev/null +++ b/CVE-2023/CVE-2023-303xx/CVE-2023-30351.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-30351", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-10T16:15:11.497", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for root which is stored using weak encryption. This vulnerability allows attackers to connect to the TELNET service (or UART) by using the exposed credentials." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_PRA.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_RRA.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-303xx/CVE-2023-30352.json b/CVE-2023/CVE-2023-303xx/CVE-2023-30352.json new file mode 100644 index 00000000000..a2385ba1a9b --- /dev/null +++ b/CVE-2023/CVE-2023-303xx/CVE-2023-30352.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-30352", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-10T16:15:11.690", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for the RTSP feed." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_RTSPa.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-303xx/CVE-2023-30353.json b/CVE-2023/CVE-2023-303xx/CVE-2023-30353.json new file mode 100644 index 00000000000..617bb795d6f --- /dev/null +++ b/CVE-2023/CVE-2023-303xx/CVE-2023-30353.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-30353", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-10T16:15:11.860", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 allows unauthenticated remote code execution via an XML document." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_uRCE.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-303xx/CVE-2023-30354.json b/CVE-2023/CVE-2023-303xx/CVE-2023-30354.json new file mode 100644 index 00000000000..1ae7e7a6cb2 --- /dev/null +++ b/CVE-2023/CVE-2023-303xx/CVE-2023-30354.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-30354", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-10T16:15:12.017", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 does not defend against physical access to U-Boot via the UART: the Wi-Fi password is shown, and the hardcoded boot password can be inserted for console access." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_NCD.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_PBA.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-303xx/CVE-2023-30356.json b/CVE-2023/CVE-2023-303xx/CVE-2023-30356.json new file mode 100644 index 00000000000..53b2cebd631 --- /dev/null +++ b/CVE-2023/CVE-2023-303xx/CVE-2023-30356.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-30356", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-10T16:15:12.187", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Missing Support for an Integrity Check in Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 allows attackers to update the device with crafted firmware" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_MU.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30403.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30403.json index e7b7e62d31c..9a5802da586 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30403.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30403.json @@ -2,23 +2,87 @@ "id": "CVE-2023-30403", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-02T20:15:10.880", - "lastModified": "2023-05-03T10:33:50.897", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:47:26.307", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the time-based authentication mechanism of Aigital Aigital Wireless-N Repeater Mini_Router v0.131229 allows attackers to bypass login by connecting to the web app after a successful attempt by a legitimate user." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:aigital:wireless-n_repeater_mini_router_firmware:0.131229:*:*:*:*:*:*:*", + "matchCriteriaId": "98062FCB-6507-4EDF-8445-6331EB735BBC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:aigital:wireless-n_repeater_mini_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80F57200-B5E5-482B-908F-B715109893B1" + } + ] + } + ] + } + ], "references": [ - { - "url": "https://dl.packetstormsecurity.net/2305-exploits/aigitalwnr-bypass.txt", - "source": "cve@mitre.org" - }, { "url": "https://mandomat.github.io/2023-04-13-testing-a-cheap-wifi-repeater/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-306xx/CVE-2023-30619.json b/CVE-2023/CVE-2023-306xx/CVE-2023-30619.json index ec61c6299bf..4007f4e81d2 100644 --- a/CVE-2023/CVE-2023-306xx/CVE-2023-30619.json +++ b/CVE-2023/CVE-2023-306xx/CVE-2023-30619.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30619", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-04T14:15:11.663", - "lastModified": "2023-05-04T18:45:32.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:15:47.917", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,22 +66,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", + "versionStartIncluding": "14.7.99.76", + "versionEndExcluding": "14.7.99.143", + "matchCriteriaId": "413A17BF-37CE-413F-9FC3-62728A0713F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Enalean/tuleap/commit/fdc93a736cbccad05de16ff0cc7cc3ef18dc93df", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-7fm3-cr3g-5922", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=fdc93a736cbccad05de16ff0cc7cc3ef18dc93df", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://tuleap.net/plugins/tracker/?aid=31586", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-308xx/CVE-2023-30853.json b/CVE-2023/CVE-2023-308xx/CVE-2023-30853.json index f19739fb9d7..3070874b476 100644 --- a/CVE-2023/CVE-2023-308xx/CVE-2023-30853.json +++ b/CVE-2023/CVE-2023-308xx/CVE-2023-30853.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30853", "sourceIdentifier": "security-advisories@github.com", "published": "2023-04-28T16:15:10.127", - "lastModified": "2023-04-28T17:06:22.820", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T17:04:52.693", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,14 +76,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gradle:build_action:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.2", + "matchCriteriaId": "DF234E1A-9C17-407C-B5DE-703690D148F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gradle/gradle-build-action/releases/tag/v2.4.2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/gradle/gradle-build-action/security/advisories/GHSA-h3qr-39j9-4r5v", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-308xx/CVE-2023-30856.json b/CVE-2023/CVE-2023-308xx/CVE-2023-30856.json index 4d7e7132232..f0fc792e64c 100644 --- a/CVE-2023/CVE-2023-308xx/CVE-2023-30856.json +++ b/CVE-2023/CVE-2023-308xx/CVE-2023-30856.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30856", "sourceIdentifier": "security-advisories@github.com", "published": "2023-04-28T16:15:10.260", - "lastModified": "2023-04-28T17:06:22.820", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:48:45.100", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,18 +80,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:edex-ui_project:edex-ui:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.2.8", + "matchCriteriaId": "86B052F3-CD9C-401F-BCDA-7BB1E037CE35" + } + ] + } + ] + } + ], "references": [ { "url": "https://christian-schneider.net/CrossSiteWebSocketHijacking.html", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Technical Description" + ] }, { "url": "https://github.com/GitSquared/edex-ui/blob/04a00c4079908788b371c6ecdefff96d0d9950f8/src/classes/terminal.class.js#L458", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/GitSquared/edex-ui/security/advisories/GHSA-q8xc-f2wf-ffh9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-309xx/CVE-2023-30943.json b/CVE-2023/CVE-2023-309xx/CVE-2023-30943.json index 0438f828f1b..529c48eff1a 100644 --- a/CVE-2023/CVE-2023-309xx/CVE-2023-30943.json +++ b/CVE-2023/CVE-2023-309xx/CVE-2023-30943.json @@ -2,16 +2,49 @@ "id": "CVE-2023-30943", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-05-02T20:15:10.943", - "lastModified": "2023-05-03T10:33:50.897", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:45:38.793", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-610" + } + ] + }, { "source": "patrick@puiterwijk.org", "type": "Secondary", @@ -23,18 +56,79 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndExcluding": "4.1.3", + "matchCriteriaId": "B4455906-4C25-43E1-BC53-EAAB4A535AB2" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3D9C7598-4BB4-442A-86DF-EEDE041A4CC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", + "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + } + ], "references": [ { "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77718", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Patch" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188605", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] }, { "url": "https://moodle.org/mod/forum/discuss.php?d=446285", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-309xx/CVE-2023-30944.json b/CVE-2023/CVE-2023-309xx/CVE-2023-30944.json index 680f2494371..61bf61be838 100644 --- a/CVE-2023/CVE-2023-309xx/CVE-2023-30944.json +++ b/CVE-2023/CVE-2023-309xx/CVE-2023-30944.json @@ -2,16 +2,49 @@ "id": "CVE-2023-30944", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-05-02T20:15:11.013", - "lastModified": "2023-05-03T10:33:50.897", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-10T16:45:56.060", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "patrick@puiterwijk.org", "type": "Secondary", @@ -23,18 +56,100 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.9.0", + "versionEndExcluding": "3.9.21", + "matchCriteriaId": "301CA8E4-1D63-49BE-B932-82AE0BFB5B6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.11.0", + "versionEndExcluding": "3.11.14", + "matchCriteriaId": "85F0F625-B52F-4C54-AB89-1F96A9C61867" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.0.8", + "matchCriteriaId": "FB2B955B-4545-4A4E-AF10-A15D40B1EAA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndExcluding": "4.1.3", + "matchCriteriaId": "B4455906-4C25-43E1-BC53-EAAB4A535AB2" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3D9C7598-4BB4-442A-86DF-EEDE041A4CC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", + "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + } + ], "references": [ { "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77187", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Patch" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188606", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] }, { "url": "https://moodle.org/mod/forum/discuss.php?d=446286", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31554.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31554.json new file mode 100644 index 00000000000..84d4087bb1d --- /dev/null +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31554.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-31554", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-10T16:15:12.263", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "xpdf pdfimages v4.04 was discovered to contain a stack overflow in the component Catalog::readPageLabelTree2(Object*). This vulnerability allows attackers to cause a Denial of Service (DoS)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?t=42421", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31555.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31555.json new file mode 100644 index 00000000000..56734aa3cf6 --- /dev/null +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31555.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-31555", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-10T16:15:12.317", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "podofoinfo 0.10.0 was discovered to contain a segmentation violation via the function PoDoFo::PdfObject::DelayedLoad." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/podofo/podofo/issues/67", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31556.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31556.json new file mode 100644 index 00000000000..5e8b075f20f --- /dev/null +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31556.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-31556", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-10T16:15:12.367", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "podofoinfo 0.10.0 was discovered to contain a segmentation violation via the function PoDoFo::PdfDictionary::findKeyParent." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/podofo/podofo/issues/66", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31557.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31557.json new file mode 100644 index 00000000000..766f645c597 --- /dev/null +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31557.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-31557", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-10T16:15:12.427", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "xpdf pdfimages v4.04 was discovered to contain a stack overflow in the component Catalog::readEmbeddedFileTree(Object*). This vulnerability allows attackers to cause a Denial of Service (DoS)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?t=42422&sid=acb8ed31bbd74223e3c4d0fb2552c748", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31566.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31566.json new file mode 100644 index 00000000000..1e7f2f08c96 --- /dev/null +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31566.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-31566", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-10T16:15:12.567", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Podofo v0.10.0 was discovered to contain a heap-use-after-free via the component PoDoFo::PdfEncrypt::IsMetadataEncrypted()." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/podofo/podofo/issues/70", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31567.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31567.json new file mode 100644 index 00000000000..fe03ef3e155 --- /dev/null +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31567.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-31567", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-10T16:15:12.720", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Podofo v0.10.0 was discovered to contain a heap buffer overflow via the component PoDoFo::PdfEncryptAESV3::PdfEncryptAESV3." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/podofo/podofo/issues/71", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31568.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31568.json new file mode 100644 index 00000000000..cc134fb7ea5 --- /dev/null +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31568.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-31568", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-10T16:15:12.810", + "lastModified": "2023-05-10T17:06:24.873", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Podofo v0.10.0 was discovered to contain a heap buffer overflow via the component PoDoFo::PdfEncryptRC4::PdfEncryptRC4." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/podofo/podofo/issues/72", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 254e5b51e76..5fa228898c5 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-10T16:00:24.757312+00:00 +2023-05-10T18:00:24.343146+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-10T15:37:47.167000+00:00 +2023-05-10T17:26:57.547000+00:00 ``` ### Last Data Feed Release @@ -29,139 +29,61 @@ Download and Changelog: [Click](releases/latest) ### Total Number of included CVEs ```plain -214823 +214842 ``` ### CVEs added in the last Commit -Recently added CVEs: `99` +Recently added CVEs: `19` -* [CVE-2022-21162](CVE-2022/CVE-2022-211xx/CVE-2022-21162.json) (`2023-05-10T14:15:10.603`) -* [CVE-2022-21239](CVE-2022/CVE-2022-212xx/CVE-2022-21239.json) (`2023-05-10T14:15:10.920`) -* [CVE-2022-21804](CVE-2022/CVE-2022-218xx/CVE-2022-21804.json) (`2023-05-10T14:15:11.010`) -* [CVE-2022-25976](CVE-2022/CVE-2022-259xx/CVE-2022-25976.json) (`2023-05-10T14:15:11.097`) -* [CVE-2022-27180](CVE-2022/CVE-2022-271xx/CVE-2022-27180.json) (`2023-05-10T14:15:11.187`) -* [CVE-2022-28699](CVE-2022/CVE-2022-286xx/CVE-2022-28699.json) (`2023-05-10T14:15:11.267`) -* [CVE-2022-29508](CVE-2022/CVE-2022-295xx/CVE-2022-29508.json) (`2023-05-10T14:15:11.350`) -* [CVE-2022-29919](CVE-2022/CVE-2022-299xx/CVE-2022-29919.json) (`2023-05-10T14:15:11.480`) -* [CVE-2022-30338](CVE-2022/CVE-2022-303xx/CVE-2022-30338.json) (`2023-05-10T14:15:11.573`) -* [CVE-2022-31477](CVE-2022/CVE-2022-314xx/CVE-2022-31477.json) (`2023-05-10T14:15:11.667`) -* [CVE-2022-32576](CVE-2022/CVE-2022-325xx/CVE-2022-32576.json) (`2023-05-10T14:15:11.760`) -* [CVE-2022-32577](CVE-2022/CVE-2022-325xx/CVE-2022-32577.json) (`2023-05-10T14:15:11.837`) -* [CVE-2022-32578](CVE-2022/CVE-2022-325xx/CVE-2022-32578.json) (`2023-05-10T14:15:11.970`) -* [CVE-2022-32582](CVE-2022/CVE-2022-325xx/CVE-2022-32582.json) (`2023-05-10T14:15:12.113`) -* [CVE-2022-32766](CVE-2022/CVE-2022-327xx/CVE-2022-32766.json) (`2023-05-10T14:15:12.440`) -* [CVE-2022-33894](CVE-2022/CVE-2022-338xx/CVE-2022-33894.json) (`2023-05-10T14:15:12.630`) -* [CVE-2022-33963](CVE-2022/CVE-2022-339xx/CVE-2022-33963.json) (`2023-05-10T14:15:12.783`) -* [CVE-2022-34147](CVE-2022/CVE-2022-341xx/CVE-2022-34147.json) (`2023-05-10T14:15:12.977`) -* [CVE-2022-34848](CVE-2022/CVE-2022-348xx/CVE-2022-34848.json) (`2023-05-10T14:15:13.147`) -* [CVE-2022-34855](CVE-2022/CVE-2022-348xx/CVE-2022-34855.json) (`2023-05-10T14:15:13.243`) -* [CVE-2022-36339](CVE-2022/CVE-2022-363xx/CVE-2022-36339.json) (`2023-05-10T14:15:13.343`) -* [CVE-2022-36391](CVE-2022/CVE-2022-363xx/CVE-2022-36391.json) (`2023-05-10T14:15:13.440`) -* [CVE-2022-37327](CVE-2022/CVE-2022-373xx/CVE-2022-37327.json) (`2023-05-10T14:15:13.553`) -* [CVE-2022-37409](CVE-2022/CVE-2022-374xx/CVE-2022-37409.json) (`2023-05-10T14:15:13.647`) -* [CVE-2022-38087](CVE-2022/CVE-2022-380xx/CVE-2022-38087.json) (`2023-05-10T14:15:13.740`) -* [CVE-2022-38101](CVE-2022/CVE-2022-381xx/CVE-2022-38101.json) (`2023-05-10T14:15:13.833`) -* [CVE-2022-38103](CVE-2022/CVE-2022-381xx/CVE-2022-38103.json) (`2023-05-10T14:15:13.923`) -* [CVE-2022-38787](CVE-2022/CVE-2022-387xx/CVE-2022-38787.json) (`2023-05-10T14:15:14.017`) -* [CVE-2022-40207](CVE-2022/CVE-2022-402xx/CVE-2022-40207.json) (`2023-05-10T14:15:14.133`) -* [CVE-2022-40210](CVE-2022/CVE-2022-402xx/CVE-2022-40210.json) (`2023-05-10T14:15:14.267`) -* [CVE-2022-40685](CVE-2022/CVE-2022-406xx/CVE-2022-40685.json) (`2023-05-10T14:15:14.623`) -* [CVE-2022-40971](CVE-2022/CVE-2022-409xx/CVE-2022-40971.json) (`2023-05-10T14:15:14.987`) -* [CVE-2022-40972](CVE-2022/CVE-2022-409xx/CVE-2022-40972.json) (`2023-05-10T14:15:15.373`) -* [CVE-2022-40974](CVE-2022/CVE-2022-409xx/CVE-2022-40974.json) (`2023-05-10T14:15:15.933`) -* [CVE-2022-41610](CVE-2022/CVE-2022-416xx/CVE-2022-41610.json) (`2023-05-10T14:15:16.370`) -* [CVE-2022-41621](CVE-2022/CVE-2022-416xx/CVE-2022-41621.json) (`2023-05-10T14:15:16.763`) -* [CVE-2022-41628](CVE-2022/CVE-2022-416xx/CVE-2022-41628.json) (`2023-05-10T14:15:17.127`) -* [CVE-2022-41646](CVE-2022/CVE-2022-416xx/CVE-2022-41646.json) (`2023-05-10T14:15:17.533`) -* [CVE-2022-41658](CVE-2022/CVE-2022-416xx/CVE-2022-41658.json) (`2023-05-10T14:15:18.097`) -* [CVE-2022-41687](CVE-2022/CVE-2022-416xx/CVE-2022-41687.json) (`2023-05-10T14:15:18.417`) -* [CVE-2022-41690](CVE-2022/CVE-2022-416xx/CVE-2022-41690.json) (`2023-05-10T14:15:18.737`) -* [CVE-2022-41693](CVE-2022/CVE-2022-416xx/CVE-2022-41693.json) (`2023-05-10T14:15:19.067`) -* [CVE-2022-41699](CVE-2022/CVE-2022-416xx/CVE-2022-41699.json) (`2023-05-10T14:15:19.400`) -* [CVE-2022-41769](CVE-2022/CVE-2022-417xx/CVE-2022-41769.json) (`2023-05-10T14:15:19.750`) -* [CVE-2022-41771](CVE-2022/CVE-2022-417xx/CVE-2022-41771.json) (`2023-05-10T14:15:20.247`) -* [CVE-2022-41784](CVE-2022/CVE-2022-417xx/CVE-2022-41784.json) (`2023-05-10T14:15:20.730`) -* [CVE-2022-41801](CVE-2022/CVE-2022-418xx/CVE-2022-41801.json) (`2023-05-10T14:15:21.153`) -* [CVE-2022-41808](CVE-2022/CVE-2022-418xx/CVE-2022-41808.json) (`2023-05-10T14:15:21.477`) -* [CVE-2022-41979](CVE-2022/CVE-2022-419xx/CVE-2022-41979.json) (`2023-05-10T14:15:21.800`) -* [CVE-2022-41982](CVE-2022/CVE-2022-419xx/CVE-2022-41982.json) (`2023-05-10T14:15:22.117`) -* [CVE-2022-41998](CVE-2022/CVE-2022-419xx/CVE-2022-41998.json) (`2023-05-10T14:15:22.430`) -* [CVE-2022-42465](CVE-2022/CVE-2022-424xx/CVE-2022-42465.json) (`2023-05-10T14:15:22.740`) -* [CVE-2022-42878](CVE-2022/CVE-2022-428xx/CVE-2022-42878.json) (`2023-05-10T14:15:23.103`) -* [CVE-2022-43465](CVE-2022/CVE-2022-434xx/CVE-2022-43465.json) (`2023-05-10T14:15:23.423`) -* [CVE-2022-43474](CVE-2022/CVE-2022-434xx/CVE-2022-43474.json) (`2023-05-10T14:15:23.727`) -* [CVE-2022-43475](CVE-2022/CVE-2022-434xx/CVE-2022-43475.json) (`2023-05-10T14:15:24.070`) -* [CVE-2022-43507](CVE-2022/CVE-2022-435xx/CVE-2022-43507.json) (`2023-05-10T14:15:24.400`) -* [CVE-2022-44610](CVE-2022/CVE-2022-446xx/CVE-2022-44610.json) (`2023-05-10T14:15:24.720`) -* [CVE-2022-44619](CVE-2022/CVE-2022-446xx/CVE-2022-44619.json) (`2023-05-10T14:15:25.067`) -* [CVE-2022-45128](CVE-2022/CVE-2022-451xx/CVE-2022-45128.json) (`2023-05-10T14:15:25.387`) -* [CVE-2022-46279](CVE-2022/CVE-2022-462xx/CVE-2022-46279.json) (`2023-05-10T14:15:25.710`) -* [CVE-2022-46645](CVE-2022/CVE-2022-466xx/CVE-2022-46645.json) (`2023-05-10T14:15:26.070`) -* [CVE-2022-46656](CVE-2022/CVE-2022-466xx/CVE-2022-46656.json) (`2023-05-10T14:15:26.340`) -* [CVE-2023-22297](CVE-2023/CVE-2023-222xx/CVE-2023-22297.json) (`2023-05-10T14:15:26.607`) -* [CVE-2023-22312](CVE-2023/CVE-2023-223xx/CVE-2023-22312.json) (`2023-05-10T14:15:26.943`) -* [CVE-2023-22355](CVE-2023/CVE-2023-223xx/CVE-2023-22355.json) (`2023-05-10T14:15:27.240`) -* [CVE-2023-22379](CVE-2023/CVE-2023-223xx/CVE-2023-22379.json) (`2023-05-10T14:15:27.557`) -* [CVE-2023-22440](CVE-2023/CVE-2023-224xx/CVE-2023-22440.json) (`2023-05-10T14:15:27.873`) -* [CVE-2023-22442](CVE-2023/CVE-2023-224xx/CVE-2023-22442.json) (`2023-05-10T14:15:28.187`) -* [CVE-2023-22443](CVE-2023/CVE-2023-224xx/CVE-2023-22443.json) (`2023-05-10T14:15:28.600`) -* [CVE-2023-22447](CVE-2023/CVE-2023-224xx/CVE-2023-22447.json) (`2023-05-10T14:15:28.900`) -* [CVE-2023-22661](CVE-2023/CVE-2023-226xx/CVE-2023-22661.json) (`2023-05-10T14:15:29.207`) -* [CVE-2023-23569](CVE-2023/CVE-2023-235xx/CVE-2023-23569.json) (`2023-05-10T14:15:29.507`) -* [CVE-2023-23573](CVE-2023/CVE-2023-235xx/CVE-2023-23573.json) (`2023-05-10T14:15:29.840`) -* [CVE-2023-23580](CVE-2023/CVE-2023-235xx/CVE-2023-23580.json) (`2023-05-10T14:15:30.253`) -* [CVE-2023-23909](CVE-2023/CVE-2023-239xx/CVE-2023-23909.json) (`2023-05-10T14:15:30.667`) -* [CVE-2023-23910](CVE-2023/CVE-2023-239xx/CVE-2023-23910.json) (`2023-05-10T14:15:30.950`) -* [CVE-2023-24475](CVE-2023/CVE-2023-244xx/CVE-2023-24475.json) (`2023-05-10T14:15:31.273`) -* [CVE-2023-25175](CVE-2023/CVE-2023-251xx/CVE-2023-25175.json) (`2023-05-10T14:15:31.587`) -* [CVE-2023-25179](CVE-2023/CVE-2023-251xx/CVE-2023-25179.json) (`2023-05-10T14:15:31.930`) -* [CVE-2023-25545](CVE-2023/CVE-2023-255xx/CVE-2023-25545.json) (`2023-05-10T14:15:32.107`) -* [CVE-2023-25568](CVE-2023/CVE-2023-255xx/CVE-2023-25568.json) (`2023-05-10T14:15:32.187`) -* [CVE-2023-25771](CVE-2023/CVE-2023-257xx/CVE-2023-25771.json) (`2023-05-10T14:15:32.310`) -* [CVE-2023-25772](CVE-2023/CVE-2023-257xx/CVE-2023-25772.json) (`2023-05-10T14:15:32.397`) -* [CVE-2023-25776](CVE-2023/CVE-2023-257xx/CVE-2023-25776.json) (`2023-05-10T14:15:32.490`) -* [CVE-2023-27298](CVE-2023/CVE-2023-272xx/CVE-2023-27298.json) (`2023-05-10T14:15:32.563`) -* [CVE-2023-27382](CVE-2023/CVE-2023-273xx/CVE-2023-27382.json) (`2023-05-10T14:15:32.647`) -* [CVE-2023-27386](CVE-2023/CVE-2023-273xx/CVE-2023-27386.json) (`2023-05-10T14:15:32.740`) -* [CVE-2023-27562](CVE-2023/CVE-2023-275xx/CVE-2023-27562.json) (`2023-05-10T15:15:08.817`) -* [CVE-2023-27563](CVE-2023/CVE-2023-275xx/CVE-2023-27563.json) (`2023-05-10T15:15:09.483`) -* [CVE-2023-27564](CVE-2023/CVE-2023-275xx/CVE-2023-27564.json) (`2023-05-10T15:15:09.660`) -* [CVE-2023-28410](CVE-2023/CVE-2023-284xx/CVE-2023-28410.json) (`2023-05-10T14:15:33.037`) -* [CVE-2023-28411](CVE-2023/CVE-2023-284xx/CVE-2023-28411.json) (`2023-05-10T14:15:33.343`) -* [CVE-2023-29930](CVE-2023/CVE-2023-299xx/CVE-2023-29930.json) (`2023-05-10T15:15:09.803`) -* [CVE-2023-31471](CVE-2023/CVE-2023-314xx/CVE-2023-31471.json) (`2023-05-10T15:15:10.017`) -* [CVE-2023-31906](CVE-2023/CVE-2023-319xx/CVE-2023-31906.json) (`2023-05-10T15:15:10.187`) -* [CVE-2023-31907](CVE-2023/CVE-2023-319xx/CVE-2023-31907.json) (`2023-05-10T15:15:10.353`) -* [CVE-2023-31908](CVE-2023/CVE-2023-319xx/CVE-2023-31908.json) (`2023-05-10T15:15:10.533`) -* [CVE-2023-31910](CVE-2023/CVE-2023-319xx/CVE-2023-31910.json) (`2023-05-10T15:15:10.697`) +* [CVE-2022-41985](CVE-2022/CVE-2022-419xx/CVE-2022-41985.json) (`2023-05-10T16:15:09.400`) +* [CVE-2022-46377](CVE-2022/CVE-2022-463xx/CVE-2022-46377.json) (`2023-05-10T16:15:10.153`) +* [CVE-2022-46378](CVE-2022/CVE-2022-463xx/CVE-2022-46378.json) (`2023-05-10T16:15:10.413`) +* [CVE-2023-0007](CVE-2023/CVE-2023-00xx/CVE-2023-0007.json) (`2023-05-10T17:15:08.910`) +* [CVE-2023-0008](CVE-2023/CVE-2023-00xx/CVE-2023-0008.json) (`2023-05-10T17:15:09.040`) +* [CVE-2023-2629](CVE-2023/CVE-2023-26xx/CVE-2023-2629.json) (`2023-05-10T16:15:10.660`) +* [CVE-2023-2630](CVE-2023/CVE-2023-26xx/CVE-2023-2630.json) (`2023-05-10T16:15:11.157`) +* [CVE-2023-30351](CVE-2023/CVE-2023-303xx/CVE-2023-30351.json) (`2023-05-10T16:15:11.497`) +* [CVE-2023-30352](CVE-2023/CVE-2023-303xx/CVE-2023-30352.json) (`2023-05-10T16:15:11.690`) +* [CVE-2023-30353](CVE-2023/CVE-2023-303xx/CVE-2023-30353.json) (`2023-05-10T16:15:11.860`) +* [CVE-2023-30354](CVE-2023/CVE-2023-303xx/CVE-2023-30354.json) (`2023-05-10T16:15:12.017`) +* [CVE-2023-30356](CVE-2023/CVE-2023-303xx/CVE-2023-30356.json) (`2023-05-10T16:15:12.187`) +* [CVE-2023-31554](CVE-2023/CVE-2023-315xx/CVE-2023-31554.json) (`2023-05-10T16:15:12.263`) +* [CVE-2023-31555](CVE-2023/CVE-2023-315xx/CVE-2023-31555.json) (`2023-05-10T16:15:12.317`) +* [CVE-2023-31556](CVE-2023/CVE-2023-315xx/CVE-2023-31556.json) (`2023-05-10T16:15:12.367`) +* [CVE-2023-31557](CVE-2023/CVE-2023-315xx/CVE-2023-31557.json) (`2023-05-10T16:15:12.427`) +* [CVE-2023-31566](CVE-2023/CVE-2023-315xx/CVE-2023-31566.json) (`2023-05-10T16:15:12.567`) +* [CVE-2023-31567](CVE-2023/CVE-2023-315xx/CVE-2023-31567.json) (`2023-05-10T16:15:12.720`) +* [CVE-2023-31568](CVE-2023/CVE-2023-315xx/CVE-2023-31568.json) (`2023-05-10T16:15:12.810`) ### CVEs modified in the last Commit -Recently modified CVEs: `21` +Recently modified CVEs: `23` -* [CVE-2022-40302](CVE-2022/CVE-2022-403xx/CVE-2022-40302.json) (`2023-05-10T15:18:03.120`) -* [CVE-2022-40318](CVE-2022/CVE-2022-403xx/CVE-2022-40318.json) (`2023-05-10T15:18:05.483`) -* [CVE-2022-43681](CVE-2022/CVE-2022-436xx/CVE-2022-43681.json) (`2023-05-10T15:17:58.587`) -* [CVE-2022-47758](CVE-2022/CVE-2022-477xx/CVE-2022-47758.json) (`2023-05-10T14:48:13.287`) -* [CVE-2022-47874](CVE-2022/CVE-2022-478xx/CVE-2022-47874.json) (`2023-05-10T14:07:40.213`) -* [CVE-2022-47878](CVE-2022/CVE-2022-478xx/CVE-2022-47878.json) (`2023-05-10T14:10:16.187`) -* [CVE-2023-25438](CVE-2023/CVE-2023-254xx/CVE-2023-25438.json) (`2023-05-10T15:37:47.167`) -* [CVE-2023-26089](CVE-2023/CVE-2023-260xx/CVE-2023-26089.json) (`2023-05-10T15:27:30.670`) -* [CVE-2023-26546](CVE-2023/CVE-2023-265xx/CVE-2023-26546.json) (`2023-05-10T14:29:42.873`) -* [CVE-2023-27568](CVE-2023/CVE-2023-275xx/CVE-2023-27568.json) (`2023-05-10T15:25:41.497`) -* [CVE-2023-27971](CVE-2023/CVE-2023-279xx/CVE-2023-27971.json) (`2023-05-10T14:18:43.993`) -* [CVE-2023-27972](CVE-2023/CVE-2023-279xx/CVE-2023-27972.json) (`2023-05-10T14:19:50.560`) -* [CVE-2023-29638](CVE-2023/CVE-2023-296xx/CVE-2023-29638.json) (`2023-05-10T14:14:15.467`) -* [CVE-2023-30093](CVE-2023/CVE-2023-300xx/CVE-2023-30093.json) (`2023-05-10T14:15:33.787`) -* [CVE-2023-30094](CVE-2023/CVE-2023-300xx/CVE-2023-30094.json) (`2023-05-10T14:15:34.343`) -* [CVE-2023-30095](CVE-2023/CVE-2023-300xx/CVE-2023-30095.json) (`2023-05-10T14:15:34.780`) -* [CVE-2023-30096](CVE-2023/CVE-2023-300xx/CVE-2023-30096.json) (`2023-05-10T14:15:35.217`) -* [CVE-2023-30097](CVE-2023/CVE-2023-300xx/CVE-2023-30097.json) (`2023-05-10T14:15:35.590`) -* [CVE-2023-30205](CVE-2023/CVE-2023-302xx/CVE-2023-30205.json) (`2023-05-10T15:27:26.073`) -* [CVE-2023-30639](CVE-2023/CVE-2023-306xx/CVE-2023-30639.json) (`2023-05-10T14:25:50.757`) -* [CVE-2023-31290](CVE-2023/CVE-2023-312xx/CVE-2023-31290.json) (`2023-05-10T15:27:15.117`) +* [CVE-2022-30759](CVE-2022/CVE-2022-307xx/CVE-2022-30759.json) (`2023-05-10T16:46:11.517`) +* [CVE-2022-31643](CVE-2022/CVE-2022-316xx/CVE-2022-31643.json) (`2023-05-10T17:05:29.027`) +* [CVE-2022-4568](CVE-2022/CVE-2022-45xx/CVE-2022-4568.json) (`2023-05-10T17:21:47.793`) +* [CVE-2022-48482](CVE-2022/CVE-2022-484xx/CVE-2022-48482.json) (`2023-05-10T17:11:08.560`) +* [CVE-2022-48483](CVE-2022/CVE-2022-484xx/CVE-2022-48483.json) (`2023-05-10T16:53:31.000`) +* [CVE-2023-1526](CVE-2023/CVE-2023-15xx/CVE-2023-1526.json) (`2023-05-10T16:47:44.507`) +* [CVE-2023-24958](CVE-2023/CVE-2023-249xx/CVE-2023-24958.json) (`2023-05-10T16:20:12.727`) +* [CVE-2023-26010](CVE-2023/CVE-2023-260xx/CVE-2023-26010.json) (`2023-05-10T16:19:04.733`) +* [CVE-2023-26012](CVE-2023/CVE-2023-260xx/CVE-2023-26012.json) (`2023-05-10T16:18:12.210`) +* [CVE-2023-26268](CVE-2023/CVE-2023-262xx/CVE-2023-26268.json) (`2023-05-10T16:08:34.207`) +* [CVE-2023-27892](CVE-2023/CVE-2023-278xx/CVE-2023-27892.json) (`2023-05-10T16:07:16.483`) +* [CVE-2023-29057](CVE-2023/CVE-2023-290xx/CVE-2023-29057.json) (`2023-05-10T16:09:19.657`) +* [CVE-2023-29827](CVE-2023/CVE-2023-298xx/CVE-2023-29827.json) (`2023-05-10T16:17:45.330`) +* [CVE-2023-29856](CVE-2023/CVE-2023-298xx/CVE-2023-29856.json) (`2023-05-10T17:26:57.547`) +* [CVE-2023-29867](CVE-2023/CVE-2023-298xx/CVE-2023-29867.json) (`2023-05-10T17:26:40.840`) +* [CVE-2023-29994](CVE-2023/CVE-2023-299xx/CVE-2023-29994.json) (`2023-05-10T16:03:43.517`) +* [CVE-2023-30024](CVE-2023/CVE-2023-300xx/CVE-2023-30024.json) (`2023-05-10T16:12:16.157`) +* [CVE-2023-30403](CVE-2023/CVE-2023-304xx/CVE-2023-30403.json) (`2023-05-10T16:47:26.307`) +* [CVE-2023-30619](CVE-2023/CVE-2023-306xx/CVE-2023-30619.json) (`2023-05-10T16:15:47.917`) +* [CVE-2023-30853](CVE-2023/CVE-2023-308xx/CVE-2023-30853.json) (`2023-05-10T17:04:52.693`) +* [CVE-2023-30856](CVE-2023/CVE-2023-308xx/CVE-2023-30856.json) (`2023-05-10T16:48:45.100`) +* [CVE-2023-30943](CVE-2023/CVE-2023-309xx/CVE-2023-30943.json) (`2023-05-10T16:45:38.793`) +* [CVE-2023-30944](CVE-2023/CVE-2023-309xx/CVE-2023-30944.json) (`2023-05-10T16:45:56.060`) ## Download and Usage