diff --git a/CVE-2021/CVE-2021-317xx/CVE-2021-31711.json b/CVE-2021/CVE-2021-317xx/CVE-2021-31711.json index ead0e6d5954..a89fb89bf19 100644 --- a/CVE-2021/CVE-2021-317xx/CVE-2021-31711.json +++ b/CVE-2021/CVE-2021-317xx/CVE-2021-31711.json @@ -2,19 +2,77 @@ "id": "CVE-2021-31711", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T16:15:14.197", - "lastModified": "2023-05-09T17:37:00.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-17T14:34:05.743", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability found in Trippo ResponsiveFilemanager v.9.14.0 and before allows a remote attacker to execute arbitrary code via the sort_by parameter in the dialog.php file." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:responsivefilemanager:responsivefilemanager:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.4.10", + "matchCriteriaId": "097E3AFD-7F03-4CD4-B4BB-6B73C8622F63" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/trippo/ResponsiveFilemanager/issues/661", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4008.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4008.json index 2a10904e975..9eb38788541 100644 --- a/CVE-2022/CVE-2022-40xx/CVE-2022-4008.json +++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4008.json @@ -2,19 +2,83 @@ "id": "CVE-2022-4008", "sourceIdentifier": "security@octopus.com", "published": "2023-05-10T06:15:09.000", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-17T14:42:11.513", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.9", + "versionEndExcluding": "2022.3.11043", + "matchCriteriaId": "355FEA41-8D02-4F48-A2E0-84C4688B6797" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2022.4.791", + "versionEndExcluding": "2022.4.8401", + "matchCriteriaId": "73AB9EB2-02C2-4DD5-93B1-93B3AEE61203" + } + ] + } + ] + } + ], "references": [ { "url": "https://advisories.octopus.com/post/2023/sa2023-08/", - "source": "security@octopus.com" + "source": "security@octopus.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-224xx/CVE-2023-22441.json b/CVE-2023/CVE-2023-224xx/CVE-2023-22441.json index 6de7a598588..57866c08113 100644 --- a/CVE-2023/CVE-2023-224xx/CVE-2023-22441.json +++ b/CVE-2023/CVE-2023-224xx/CVE-2023-22441.json @@ -2,39 +2,150 @@ "id": "CVE-2023-22441", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-10T06:15:11.160", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-17T15:37:23.017", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Missing authentication for critical function exists in Seiko Solutions SkyBridge series, which may allow a remote attacker to obtain or alter the setting information of the product or execute some critical functions without authentication, e.g., rebooting the product. Affected products and versions are as follows: SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, and SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:seiko-sol:skybridge_basic_mb-a130_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.4.1", + "matchCriteriaId": "F81B98BA-4C78-4798-B118-299B530081E6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:seiko-sol:skybridge_basic_mb-a130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FCACF50-F197-41A7-934C-6BDBD043A560" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:seiko-sol:skybridge_mb-a200_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "01.00.05", + "matchCriteriaId": "F23AF765-AF0C-48B7-A3DA-1A70A303C2D9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:seiko-sol:skybridge_mb-a200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45CE4F45-5595-47E3-9BD4-47EA3D4F6E0E" + } + ] + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN40604023/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.seiko-sol.co.jp/archives/73969/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Product" + ] }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Product" + ] }, { "url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Product" + ] }, { "url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2617.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2617.json index 3ec24a4079b..363cda7e6f1 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2617.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2617.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2617", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-10T06:15:16.853", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-17T15:52:34.300", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -61,7 +83,7 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -69,24 +91,66 @@ "value": "CWE-476" } ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndIncluding": "4.7.0", + "matchCriteriaId": "2F329482-7377-4F5C-A4FE-1422E54D8BAA" + } + ] + } + ] } ], "references": [ { "url": "https://gist.github.com/GZTimeWalker/3ca70a8af2f5830711e9cccc73fb5270", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/opencv/opencv_contrib/pull/3480", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://vuldb.com/?ctiid.228547", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.228547", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2618.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2618.json index d507750479a..b6954d3e821 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2618.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2618.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2618", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-10T06:15:17.577", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-17T15:54:19.420", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,22 +93,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.7.0", + "matchCriteriaId": "1108CEC2-E3CC-4F9C-B772-3A9216B1E195" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/opencv/opencv_contrib/pull/3484", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/opencv/opencv_contrib/pull/3484/commits/2b62ff6181163eea029ed1cab11363b4996e9cd6", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://vuldb.com/?ctiid.228548", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.228548", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27973.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27973.json index ee22ab48b38..7e997ee97bd 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27973.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27973.json @@ -2,19 +2,1123 @@ "id": "CVE-2023-27973", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-04-28T17:15:43.023", - "lastModified": "2023-04-28T17:43:00.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-17T14:53:00.670", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Certain HP LaserJet Pro print products are potentially vulnerable to Heap Overflow and/or Remote Code Execution." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m304-m305_w1a46a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "6827D248-4786-43F4-B670-DE8FDBDDB4DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m304-m305_w1a46a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2824878B-A718-4D7D-9016-9AF10399BDBD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m304-m305_w1a47a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "B61236E2-0C22-4ACF-8A67-E506C9AFFC68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m304-m305_w1a47a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BA0AD5B-9E7C-49BE-8190-282427E10EE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m304-m305_w1a48a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "97967F58-733F-4529-91F1-B73A95663519" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m304-m305_w1a48a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "412C00A8-50D7-4638-B1B9-C2076FE13C1F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m304-m305_w1a66a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "D1874BDA-3907-4E83-9337-E25C912EE7C5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m304-m305_w1a66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9DA51BE0-E2AE-441F-9ACA-3EB5A2D243DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m404-m405_93m22a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "6803AA31-CC02-41F3-AB3C-DCF77BC93A3D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m404-m405_93m22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7F66723-5A58-4612-97DE-2E82ED85494D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a51a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "0935E272-5AB0-4869-945C-26B9E30D09A9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a51a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A6449B5-AAEE-4BDF-A0F0-76A622043C4A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a52a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "9FB631C3-F32F-466F-824B-866922BC740E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a52a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8BF1464-C84D-4C5E-A7DE-6CBEBB2F54F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a53a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "28697927-D47E-4F7A-BAE7-2CB88A05ECBA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a53a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE480BFD-5423-46EA-A6F2-45C1143E3183" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a56a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "6B0BE218-0426-4396-BFC9-B0F62B4BC2F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a56a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EB49BED-289D-4663-B019-985D608337F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a57a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "8027C164-1F3D-44F7-A576-EBD55FD23F93" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a57a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F417CE57-3FAD-4084-BF42-ED65D7E5EDF6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a58a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "F43C3305-92A4-4E43-8FA4-104BAED57C9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a58a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FE682C6-30C8-42D3-8F67-141DF64E9B0D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a59a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "7BBBEAF8-AA67-45E7-895B-1A7DBCEECB0B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54844167-292B-42A1-BEEA-CB2F4524B4FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a60a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "00D818E4-3668-449F-AA00-0E393B81453E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a60a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B8E6F09-0BE0-4BB9-9539-86B822B49387" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a63a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "687111E1-75B0-4047-A0B2-11F8B610414C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a63a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "926EA9D9-83E0-4AA6-BAAA-31C713475473" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m453-m454_w1y40a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "ED1A27B8-0F51-4081-ABFE-377C0EDCFC55" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m453-m454_w1y40a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0B8FCC1-8C4D-4CF4-A544-185FC15CC720" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m453-m454_w1y41a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "7FA2EF63-4AFE-4437-B93D-14E984D9CEEE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m453-m454_w1y41a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B3DDD9A-8D86-4FB2-9508-BB8B21EF054B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m453-m454_w1y43a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "F4E97E5F-B8C2-45D6-B457-DA8793A5E1D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m453-m454_w1y43a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A1A6F50-AE27-45E7-98B0-9804D64188D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m453-m454_w1y44a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "4C0DEC0B-DFF9-4C56-AD59-B54B6E33FF33" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m453-m454_w1y44a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80727AC4-3B6A-4EB4-93E4-1E73D199F949" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m453-m454_w1y45a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "B008B558-D5C8-4262-ACAA-18F98DAE9F1B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m453-m454_w1y45a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4135473E-5D1D-4C4F-8FFD-C2AB797C1ECA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m453-m454_w1y46a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "DA456248-4C9D-4C44-895A-257C51EEE6D5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m453-m454_w1y46a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC8133D0-14BF-404C-81D1-EA5BC0FDF0A1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_m453-m454_w1y47a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "A4A5F666-8466-4E5F-B9DE-7759774EF941" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_m453-m454_w1y47a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8B26BEA-03DD-41E0-9356-2043FF471D30" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_f_w1a29a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "A8A6EEE9-CDDA-4D87-A313-17A001ADB5D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_f_w1a29a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CA3AEE-A266-42BE-829A-B02A1A9D1711" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_f_w1a30a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "46D45156-2D5E-45B0-99BF-11918D4B1F61" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_f_w1a30a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A21CFFF-B613-49AF-9063-E3B96BFD7207" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_f_w1a32a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "23AA63CC-C2B3-41CE-A8EF-237D35ABF5C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_f_w1a32a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E476813-B37C-4B81-8C92-E437055444FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_f_w1a34a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "2D2C7160-5158-4AA7-99E4-BEC182397074" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_f_w1a34a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57DA0387-AC56-4510-B170-D854E441FCE9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_f_w1a35a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "719BEC44-E537-4999-A380-9BB711BE2983" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_f_w1a35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AB52262-C2B3-4B1E-AD48-6EE3DF9E3950" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_f_w1a38a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "509201CD-97C4-4805-A6C1-D3A49A154BF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_f_w1a38a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEB847F0-D15E-409C-B82E-339FBF07AC7A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_w1a28a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "A0549CEA-B11B-4DF5-A8BB-C94C55B9B2F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_w1a28a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C00A9FF2-35EA-4B6F-8926-4BC79505A7B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_w1a31a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "3B109BDE-DB3C-4EDE-9ECF-FE03C1E18D9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_w1a31a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D9AFC01-5C53-4F31-9A3C-A891BC9745EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_w1a33a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "8E5F6500-6961-46EA-8607-844A42C4AF8C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_w1a33a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA0578BA-4277-4A04-ABA2-CB4A6F575B83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m478-m479_w1a75a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "F47160A7-831B-4B67-8E35-E0E2D76A6213" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m478-m479_w1a75a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C166EDB7-C8D9-45C1-B2E1-C147EAF14AE3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m478-m479_w1a76a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "FA76B5FE-0E09-4296-A4DF-3AA39E26A3F7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m478-m479_w1a76a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B6E5E81-C1E7-4917-9CE5-3175618C4F77" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m478-m479_w1a77a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "CF4D0917-16E0-4EB2-B38C-7FC82E186500" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m478-m479_w1a77a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22493ED0-0190-4620-A566-40C547FC2A2A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m478-m479_w1a78a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "3292D14A-8839-45AB-8767-4E0487A822C2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m478-m479_w1a78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96DE9C68-BC55-4E46-A6AA-45D73CFB8DAE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m478-m479_w1a79a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "A159A0B7-4620-41DC-AA01-3B38984022E6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m478-m479_w1a79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AC5824A-1DE4-4DFB-A958-A26E7B844089" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m478-m479_w1a80a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "1BAC93E2-EF65-4BB7-B358-9B117F624601" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m478-m479_w1a80a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46815386-E459-4DC6-AB89-C4524B6A830D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m478-m479_w1a81a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "ECA6009E-A1A6-444B-8E5F-D7685E47D47C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m478-m479_w1a81a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09ED8341-574A-4E0C-A4CF-6A44A48488F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:laserjet_pro_mfp_m478-m479_w1a82a_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "002_2310a", + "matchCriteriaId": "AD3D901E-F9EF-4E5F-8079-D383AAF5D692" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_pro_mfp_m478-m479_w1a82a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "708706C7-8E8B-456C-AFD1-36DFAB088A85" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.hp.com/us-en/document/ish_7920137-7920161-16/hpsbpi03841", - "source": "hp-security-alert@hp.com" + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28316.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28316.json index 431932899c0..77e83cdcb65 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28316.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28316.json @@ -2,16 +2,49 @@ "id": "CVE-2023-28316", "sourceIdentifier": "support@hackerone.com", "published": "2023-05-09T22:15:09.980", - "lastModified": "2023-05-10T02:29:55.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-17T14:55:34.737", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A security vulnerability has been discovered in the implementation of 2FA on the rocket.chat platform, where other active sessions are not invalidated upon activating 2FA. This could potentially allow an attacker to maintain access to a compromised account even after 2FA is enabled." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + }, { "source": "support@hackerone.com", "type": "Secondary", @@ -23,10 +56,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rocket.chat:rocket.chat:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAE3A1B1-27A3-4FD5-BCE6-CC713F0C8B90" + } + ] + } + ] + } + ], "references": [ { "url": "https://hackerone.com/reports/992280", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-308xx/CVE-2023-30837.json b/CVE-2023/CVE-2023-308xx/CVE-2023-30837.json index e16e16c14e8..f56dc598656 100644 --- a/CVE-2023/CVE-2023-308xx/CVE-2023-30837.json +++ b/CVE-2023/CVE-2023-308xx/CVE-2023-30837.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30837", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-08T17:15:12.007", - "lastModified": "2023-05-09T12:47:05.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-17T15:11:27.660", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,14 +66,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vyper_project:vyper:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.3.8", + "matchCriteriaId": "BD6E3906-C87B-4245-9871-27CD85C32EEF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vyperlang/vyper/commit/0bb7203b584e771b23536ba065a6efda457161bb", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-mgv8-gggw-mrg6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-308xx/CVE-2023-30860.json b/CVE-2023/CVE-2023-308xx/CVE-2023-30860.json index 6694ec15b56..53ce6903ad9 100644 --- a/CVE-2023/CVE-2023-308xx/CVE-2023-30860.json +++ b/CVE-2023/CVE-2023-308xx/CVE-2023-30860.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30860", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-08T19:15:12.310", - "lastModified": "2023-05-09T12:47:05.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-17T15:15:37.447", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,14 +66,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.4", + "matchCriteriaId": "C7827575-CC53-4298-AA70-AFD19408C79A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/WWBN/AVideo/security/advisories/GHSA-xr9h-p2rc-rpqm", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://youtu.be/Nke0Bmv5F-o", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31700.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31700.json new file mode 100644 index 00000000000..bdafc8eae58 --- /dev/null +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31700.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-31700", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-17T14:15:09.323", + "lastModified": "2023-05-17T14:15:09.323", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "TP-Link TL-WPA4530 KIT V2 (EU)_170406 and V2 (EU)_161115 is vulnerable to Command Injection via _httpRpmPlcDeviceAdd." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31701.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31701.json new file mode 100644 index 00000000000..c1a835b9b83 --- /dev/null +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31701.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-31701", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-17T14:15:09.383", + "lastModified": "2023-05-17T14:15:09.383", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "TP-Link TL-WPA4530 KIT V2 (EU)_170406 and V2 (EU)_161115 is vulnerable to Command Injection via _httpRpmPlcDeviceRemove." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31722.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31722.json new file mode 100644 index 00000000000..78d894e0064 --- /dev/null +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31722.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-31722", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-17T14:15:09.423", + "lastModified": "2023-05-17T14:15:09.423", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "There exists a heap buffer overflow in nasm 2.16.02rc1 (GitHub commit: b952891)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392857#c1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31723.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31723.json new file mode 100644 index 00000000000..79816d4a74b --- /dev/null +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31723.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-31723", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-17T15:15:08.873", + "lastModified": "2023-05-17T15:15:08.873", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function expand_mmac_params at /nasm/nasm-pp.c." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/DaisyPo/fuzzing-vulncollect/blob/main/yasm/SEGV/nasm-pp.c:4008%20in%20expand_mmac_params/README.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yasm/yasm/issues/220", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31724.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31724.json new file mode 100644 index 00000000000..e106c9051ee --- /dev/null +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31724.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-31724", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-17T15:15:08.917", + "lastModified": "2023-05-17T15:15:08.917", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function do_directive at /nasm/nasm-pp.c." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/SEGV/nasm-pp.c:3570%20in%20do_directive", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yasm/yasm/issues/222", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31725.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31725.json new file mode 100644 index 00000000000..2976f93095d --- /dev/null +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31725.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-31725", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-17T15:15:08.957", + "lastModified": "2023-05-17T15:15:08.957", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "yasm 1.3.0.55.g101bc was discovered to contain a heap-use-after-free via the function expand_mmac_params at yasm/modules/preprocs/nasm/nasm-pp.c." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/heap-use-after-free/nasm-pp.c:3878%20in%20expand_mmac_params", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yasm/yasm/issues/221", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index c99c992339a..0cd69dcb305 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-17T14:00:41.300725+00:00 +2023-05-17T16:00:34.046651+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-17T13:57:44.233000+00:00 +2023-05-17T15:54:19.420000+00:00 ``` ### Last Data Feed Release @@ -29,53 +29,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -215524 +215530 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `6` -* [CVE-2023-2679](CVE-2023/CVE-2023-26xx/CVE-2023-2679.json) (`2023-05-17T13:15:09.283`) -* [CVE-2023-30438](CVE-2023/CVE-2023-304xx/CVE-2023-30438.json) (`2023-05-17T13:15:09.380`) -* [CVE-2023-31698](CVE-2023/CVE-2023-316xx/CVE-2023-31698.json) (`2023-05-17T13:15:09.463`) -* [CVE-2023-31699](CVE-2023/CVE-2023-316xx/CVE-2023-31699.json) (`2023-05-17T13:15:09.517`) -* [CVE-2023-31702](CVE-2023/CVE-2023-317xx/CVE-2023-31702.json) (`2023-05-17T13:15:09.567`) -* [CVE-2023-31703](CVE-2023/CVE-2023-317xx/CVE-2023-31703.json) (`2023-05-17T13:15:09.617`) -* [CVE-2023-31902](CVE-2023/CVE-2023-319xx/CVE-2023-31902.json) (`2023-05-17T13:15:09.667`) -* [CVE-2023-31903](CVE-2023/CVE-2023-319xx/CVE-2023-31903.json) (`2023-05-17T13:15:09.720`) -* [CVE-2023-31904](CVE-2023/CVE-2023-319xx/CVE-2023-31904.json) (`2023-05-17T13:15:09.777`) +* [CVE-2023-31700](CVE-2023/CVE-2023-317xx/CVE-2023-31700.json) (`2023-05-17T14:15:09.323`) +* [CVE-2023-31701](CVE-2023/CVE-2023-317xx/CVE-2023-31701.json) (`2023-05-17T14:15:09.383`) +* [CVE-2023-31722](CVE-2023/CVE-2023-317xx/CVE-2023-31722.json) (`2023-05-17T14:15:09.423`) +* [CVE-2023-31723](CVE-2023/CVE-2023-317xx/CVE-2023-31723.json) (`2023-05-17T15:15:08.873`) +* [CVE-2023-31724](CVE-2023/CVE-2023-317xx/CVE-2023-31724.json) (`2023-05-17T15:15:08.917`) +* [CVE-2023-31725](CVE-2023/CVE-2023-317xx/CVE-2023-31725.json) (`2023-05-17T15:15:08.957`) ### CVEs modified in the last Commit -Recently modified CVEs: `59` +Recently modified CVEs: `9` -* [CVE-2023-29280](CVE-2023/CVE-2023-292xx/CVE-2023-29280.json) (`2023-05-17T12:49:06.630`) -* [CVE-2023-29279](CVE-2023/CVE-2023-292xx/CVE-2023-29279.json) (`2023-05-17T12:49:18.707`) -* [CVE-2023-29277](CVE-2023/CVE-2023-292xx/CVE-2023-29277.json) (`2023-05-17T12:49:25.880`) -* [CVE-2023-29278](CVE-2023/CVE-2023-292xx/CVE-2023-29278.json) (`2023-05-17T12:49:36.830`) -* [CVE-2023-27385](CVE-2023/CVE-2023-273xx/CVE-2023-27385.json) (`2023-05-17T12:49:42.820`) -* [CVE-2023-29276](CVE-2023/CVE-2023-292xx/CVE-2023-29276.json) (`2023-05-17T12:49:50.070`) -* [CVE-2023-29275](CVE-2023/CVE-2023-292xx/CVE-2023-29275.json) (`2023-05-17T12:50:00.397`) -* [CVE-2023-29274](CVE-2023/CVE-2023-292xx/CVE-2023-29274.json) (`2023-05-17T12:50:06.257`) -* [CVE-2023-29273](CVE-2023/CVE-2023-292xx/CVE-2023-29273.json) (`2023-05-17T12:50:17.923`) -* [CVE-2023-2662](CVE-2023/CVE-2023-26xx/CVE-2023-2662.json) (`2023-05-17T12:53:16.877`) -* [CVE-2023-27889](CVE-2023/CVE-2023-278xx/CVE-2023-27889.json) (`2023-05-17T12:54:41.750`) -* [CVE-2023-29791](CVE-2023/CVE-2023-297xx/CVE-2023-29791.json) (`2023-05-17T12:54:44.870`) -* [CVE-2023-2661](CVE-2023/CVE-2023-26xx/CVE-2023-2661.json) (`2023-05-17T12:56:37.437`) -* [CVE-2023-27918](CVE-2023/CVE-2023-279xx/CVE-2023-27918.json) (`2023-05-17T12:56:58.967`) -* [CVE-2023-2660](CVE-2023/CVE-2023-26xx/CVE-2023-2660.json) (`2023-05-17T12:57:04.227`) -* [CVE-2023-2659](CVE-2023/CVE-2023-26xx/CVE-2023-2659.json) (`2023-05-17T12:57:38.140`) -* [CVE-2023-22720](CVE-2023/CVE-2023-227xx/CVE-2023-22720.json) (`2023-05-17T12:58:27.107`) -* [CVE-2023-2658](CVE-2023/CVE-2023-26xx/CVE-2023-2658.json) (`2023-05-17T12:58:56.517`) -* [CVE-2023-2657](CVE-2023/CVE-2023-26xx/CVE-2023-2657.json) (`2023-05-17T12:59:22.743`) -* [CVE-2023-29286](CVE-2023/CVE-2023-292xx/CVE-2023-29286.json) (`2023-05-17T13:01:05.513`) -* [CVE-2023-29285](CVE-2023/CVE-2023-292xx/CVE-2023-29285.json) (`2023-05-17T13:01:12.327`) -* [CVE-2023-29284](CVE-2023/CVE-2023-292xx/CVE-2023-29284.json) (`2023-05-17T13:01:17.987`) -* [CVE-2023-2656](CVE-2023/CVE-2023-26xx/CVE-2023-2656.json) (`2023-05-17T13:02:41.120`) -* [CVE-2023-2630](CVE-2023/CVE-2023-26xx/CVE-2023-2630.json) (`2023-05-17T13:16:52.083`) -* [CVE-2023-32066](CVE-2023/CVE-2023-320xx/CVE-2023-32066.json) (`2023-05-17T13:57:44.233`) +* [CVE-2021-31711](CVE-2021/CVE-2021-317xx/CVE-2021-31711.json) (`2023-05-17T14:34:05.743`) +* [CVE-2022-4008](CVE-2022/CVE-2022-40xx/CVE-2022-4008.json) (`2023-05-17T14:42:11.513`) +* [CVE-2023-27973](CVE-2023/CVE-2023-279xx/CVE-2023-27973.json) (`2023-05-17T14:53:00.670`) +* [CVE-2023-28316](CVE-2023/CVE-2023-283xx/CVE-2023-28316.json) (`2023-05-17T14:55:34.737`) +* [CVE-2023-30837](CVE-2023/CVE-2023-308xx/CVE-2023-30837.json) (`2023-05-17T15:11:27.660`) +* [CVE-2023-30860](CVE-2023/CVE-2023-308xx/CVE-2023-30860.json) (`2023-05-17T15:15:37.447`) +* [CVE-2023-22441](CVE-2023/CVE-2023-224xx/CVE-2023-22441.json) (`2023-05-17T15:37:23.017`) +* [CVE-2023-2617](CVE-2023/CVE-2023-26xx/CVE-2023-2617.json) (`2023-05-17T15:52:34.300`) +* [CVE-2023-2618](CVE-2023/CVE-2023-26xx/CVE-2023-2618.json) (`2023-05-17T15:54:19.420`) ## Download and Usage