From 6aa0372d2f9d8225f7579931e936faa2bbca2f35 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 30 Jun 2023 18:00:43 +0000 Subject: [PATCH] Auto-Update: 2023-06-30T18:00:39.608665+00:00 --- CVE-2020/CVE-2020-207xx/CVE-2020-20725.json | 64 +- CVE-2021/CVE-2021-12xx/CVE-2021-1256.json | 6 +- CVE-2021/CVE-2021-16xx/CVE-2021-1624.json | 4 +- CVE-2021/CVE-2021-202xx/CVE-2021-20268.json | 14 +- CVE-2021/CVE-2021-203xx/CVE-2021-20320.json | 4 +- CVE-2021/CVE-2021-203xx/CVE-2021-20325.json | 4 +- CVE-2021/CVE-2021-214xx/CVE-2021-21428.json | 14 +- CVE-2021/CVE-2021-215xx/CVE-2021-21522.json | 4 +- CVE-2021/CVE-2021-228xx/CVE-2021-22864.json | 4 +- CVE-2021/CVE-2021-229xx/CVE-2021-22923.json | 6 +- CVE-2021/CVE-2021-229xx/CVE-2021-22948.json | 4 +- CVE-2021/CVE-2021-238xx/CVE-2021-23874.json | 16 +- CVE-2021/CVE-2021-242xx/CVE-2021-24209.json | 8 +- CVE-2021/CVE-2021-253xx/CVE-2021-25354.json | 4 +- CVE-2021/CVE-2021-263xx/CVE-2021-26314.json | 4 +- CVE-2021/CVE-2021-274xx/CVE-2021-27499.json | 4 +- CVE-2023/CVE-2023-208xx/CVE-2023-20885.json | 79 +- CVE-2023/CVE-2023-20xx/CVE-2023-2080.json | 61 +- CVE-2023/CVE-2023-211xx/CVE-2023-21169.json | 63 +- CVE-2023/CVE-2023-211xx/CVE-2023-21170.json | 63 +- CVE-2023/CVE-2023-211xx/CVE-2023-21171.json | 63 +- CVE-2023/CVE-2023-235xx/CVE-2023-23539.json | 65 +- CVE-2023/CVE-2023-24xx/CVE-2023-2431.json | 103 +- CVE-2023/CVE-2023-251xx/CVE-2023-25188.json | 95 +- CVE-2023/CVE-2023-254xx/CVE-2023-25499.json | 126 +- CVE-2023/CVE-2023-255xx/CVE-2023-25500.json | 146 +- CVE-2023/CVE-2023-260xx/CVE-2023-26062.json | 6 +- CVE-2023/CVE-2023-262xx/CVE-2023-26299.json | 20 + CVE-2023/CVE-2023-270xx/CVE-2023-27083.json | 96 +- CVE-2023/CVE-2023-273xx/CVE-2023-27396.json | 8636 ++++++++++++++++++- CVE-2023/CVE-2023-27xx/CVE-2023-2711.json | 53 +- CVE-2023/CVE-2023-27xx/CVE-2023-2743.json | 53 +- CVE-2023/CVE-2023-27xx/CVE-2023-2744.json | 53 +- CVE-2023/CVE-2023-287xx/CVE-2023-28799.json | 112 +- CVE-2023/CVE-2023-288xx/CVE-2023-28810.json | 1081 ++- CVE-2023/CVE-2023-297xx/CVE-2023-29709.json | 81 +- CVE-2023/CVE-2023-298xx/CVE-2023-29860.json | 65 +- CVE-2023/CVE-2023-31xx/CVE-2023-3128.json | 121 +- CVE-2023/CVE-2023-323xx/CVE-2023-32320.json | 108 +- CVE-2023/CVE-2023-325xx/CVE-2023-32521.json | 70 +- CVE-2023/CVE-2023-325xx/CVE-2023-32522.json | 70 +- CVE-2023/CVE-2023-325xx/CVE-2023-32557.json | 82 +- CVE-2023/CVE-2023-326xx/CVE-2023-32604.json | 64 +- CVE-2023/CVE-2023-326xx/CVE-2023-32605.json | 64 +- CVE-2023/CVE-2023-327xx/CVE-2023-32753.json | 26 +- CVE-2023/CVE-2023-331xx/CVE-2023-33141.json | 46 +- CVE-2023/CVE-2023-33xx/CVE-2023-3326.json | 155 +- CVE-2023/CVE-2023-341xx/CVE-2023-34144.json | 88 +- CVE-2023/CVE-2023-341xx/CVE-2023-34145.json | 88 +- CVE-2023/CVE-2023-341xx/CVE-2023-34146.json | 88 +- CVE-2023/CVE-2023-341xx/CVE-2023-34147.json | 88 +- CVE-2023/CVE-2023-341xx/CVE-2023-34148.json | 88 +- CVE-2023/CVE-2023-341xx/CVE-2023-34165.json | 63 +- CVE-2023/CVE-2023-344xx/CVE-2023-34462.json | 65 +- CVE-2023/CVE-2023-347xx/CVE-2023-34796.json | 70 +- CVE-2023/CVE-2023-348xx/CVE-2023-34840.json | 28 + CVE-2023/CVE-2023-349xx/CVE-2023-34923.json | 70 +- CVE-2023/CVE-2023-351xx/CVE-2023-35175.json | 20 + CVE-2023/CVE-2023-351xx/CVE-2023-35176.json | 20 + CVE-2023/CVE-2023-351xx/CVE-2023-35177.json | 20 + CVE-2023/CVE-2023-351xx/CVE-2023-35178.json | 20 + CVE-2023/CVE-2023-356xx/CVE-2023-35695.json | 70 +- CVE-2023/CVE-2023-358xx/CVE-2023-35855.json | 65 +- CVE-2023/CVE-2023-358xx/CVE-2023-35856.json | 78 +- CVE-2023/CVE-2023-361xx/CVE-2023-36191.json | 64 +- CVE-2023/CVE-2023-361xx/CVE-2023-36192.json | 65 +- CVE-2023/CVE-2023-361xx/CVE-2023-36193.json | 66 +- CVE-2023/CVE-2023-363xx/CVE-2023-36356.json | 238 +- CVE-2023/CVE-2023-363xx/CVE-2023-36357.json | 211 +- CVE-2023/CVE-2023-373xx/CVE-2023-37300.json | 24 + CVE-2023/CVE-2023-373xx/CVE-2023-37301.json | 24 + CVE-2023/CVE-2023-373xx/CVE-2023-37302.json | 28 + CVE-2023/CVE-2023-373xx/CVE-2023-37303.json | 24 + CVE-2023/CVE-2023-373xx/CVE-2023-37304.json | 24 + CVE-2023/CVE-2023-373xx/CVE-2023-37305.json | 24 + CVE-2023/CVE-2023-373xx/CVE-2023-37306.json | 24 + CVE-2023/CVE-2023-373xx/CVE-2023-37307.json | 24 + README.md | 76 +- 78 files changed, 13754 insertions(+), 281 deletions(-) create mode 100644 CVE-2023/CVE-2023-262xx/CVE-2023-26299.json create mode 100644 CVE-2023/CVE-2023-348xx/CVE-2023-34840.json create mode 100644 CVE-2023/CVE-2023-351xx/CVE-2023-35175.json create mode 100644 CVE-2023/CVE-2023-351xx/CVE-2023-35176.json create mode 100644 CVE-2023/CVE-2023-351xx/CVE-2023-35177.json create mode 100644 CVE-2023/CVE-2023-351xx/CVE-2023-35178.json create mode 100644 CVE-2023/CVE-2023-373xx/CVE-2023-37300.json create mode 100644 CVE-2023/CVE-2023-373xx/CVE-2023-37301.json create mode 100644 CVE-2023/CVE-2023-373xx/CVE-2023-37302.json create mode 100644 CVE-2023/CVE-2023-373xx/CVE-2023-37303.json create mode 100644 CVE-2023/CVE-2023-373xx/CVE-2023-37304.json create mode 100644 CVE-2023/CVE-2023-373xx/CVE-2023-37305.json create mode 100644 CVE-2023/CVE-2023-373xx/CVE-2023-37306.json create mode 100644 CVE-2023/CVE-2023-373xx/CVE-2023-37307.json diff --git a/CVE-2020/CVE-2020-207xx/CVE-2020-20725.json b/CVE-2020/CVE-2020-207xx/CVE-2020-20725.json index 1f74e4df103..7483a0276f1 100644 --- a/CVE-2020/CVE-2020-207xx/CVE-2020-20725.json +++ b/CVE-2020/CVE-2020-207xx/CVE-2020-20725.json @@ -2,19 +2,75 @@ "id": "CVE-2020-20725", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-20T15:15:10.677", - "lastModified": "2023-06-20T15:49:15.587", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:16:14.333", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in taogogo taoCMS v.2.5 beta5.1 allows remote attacker to execute arbitrary code via the name field in admin.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:taogogo:taocms:2.5:beta1:*:*:*:*:*:*", + "matchCriteriaId": "DD27C8D4-1FAB-4E1E-A7C7-9EF840F833E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/taogogo/taocms/issues/2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1256.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1256.json index 92d8828651e..75cfa15c5cb 100644 --- a/CVE-2021/CVE-2021-12xx/CVE-2021-1256.json +++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1256.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1256", "sourceIdentifier": "ykramarz@cisco.com", "published": "2021-04-29T18:15:08.840", - "lastModified": "2022-07-29T18:48:44.150", + "lastModified": "2023-06-30T17:08:37.157", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,6 +90,10 @@ "source": "nvd@nist.gov", "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-22" + }, { "lang": "en", "value": "CWE-552" diff --git a/CVE-2021/CVE-2021-16xx/CVE-2021-1624.json b/CVE-2021/CVE-2021-16xx/CVE-2021-1624.json index 66c5c1562e7..26e108f05c7 100644 --- a/CVE-2021/CVE-2021-16xx/CVE-2021-1624.json +++ b/CVE-2021/CVE-2021-16xx/CVE-2021-1624.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1624", "sourceIdentifier": "ykramarz@cisco.com", "published": "2021-09-23T03:15:13.610", - "lastModified": "2021-10-05T19:26:54.487", + "lastModified": "2023-06-30T17:09:18.313", "vulnStatus": "Analyzed", "descriptions": [ { @@ -92,7 +92,7 @@ "description": [ { "lang": "en", - "value": "CWE-400" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2021/CVE-2021-202xx/CVE-2021-20268.json b/CVE-2021/CVE-2021-202xx/CVE-2021-20268.json index e593c2b6b8e..de54bfb7904 100644 --- a/CVE-2021/CVE-2021-202xx/CVE-2021-20268.json +++ b/CVE-2021/CVE-2021-202xx/CVE-2021-20268.json @@ -2,7 +2,7 @@ "id": "CVE-2021-20268", "sourceIdentifier": "secalert@redhat.com", "published": "2021-03-09T18:15:15.687", - "lastModified": "2021-04-12T16:38:26.693", + "lastModified": "2023-06-30T17:50:04.157", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,8 +65,18 @@ }, "weaknesses": [ { - "source": "secalert@redhat.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + }, + { + "source": "secalert@redhat.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-203xx/CVE-2021-20320.json b/CVE-2021/CVE-2021-203xx/CVE-2021-20320.json index 7fee4bc37ec..3ec75f2f4ca 100644 --- a/CVE-2021/CVE-2021-203xx/CVE-2021-20320.json +++ b/CVE-2021/CVE-2021-203xx/CVE-2021-20320.json @@ -2,7 +2,7 @@ "id": "CVE-2021-20320", "sourceIdentifier": "secalert@redhat.com", "published": "2022-02-18T18:15:08.877", - "lastModified": "2022-03-03T14:43:00.690", + "lastModified": "2023-06-30T16:57:26.953", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2021/CVE-2021-203xx/CVE-2021-20325.json b/CVE-2021/CVE-2021-203xx/CVE-2021-20325.json index 18a2f9a1ee2..4f8145341af 100644 --- a/CVE-2021/CVE-2021-203xx/CVE-2021-20325.json +++ b/CVE-2021/CVE-2021-203xx/CVE-2021-20325.json @@ -2,7 +2,7 @@ "id": "CVE-2021-20325", "sourceIdentifier": "secalert@redhat.com", "published": "2022-02-18T18:15:09.080", - "lastModified": "2022-03-08T18:18:04.310", + "lastModified": "2023-06-30T17:06:00.033", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" }, { "lang": "en", diff --git a/CVE-2021/CVE-2021-214xx/CVE-2021-21428.json b/CVE-2021/CVE-2021-214xx/CVE-2021-21428.json index b2828a7bcc5..1740aaecf7e 100644 --- a/CVE-2021/CVE-2021-214xx/CVE-2021-21428.json +++ b/CVE-2021/CVE-2021-214xx/CVE-2021-21428.json @@ -2,7 +2,7 @@ "id": "CVE-2021-21428", "sourceIdentifier": "security-advisories@github.com", "published": "2021-05-10T19:15:08.060", - "lastModified": "2021-05-17T17:43:17.213", + "lastModified": "2023-06-30T17:43:37.307", "vulnStatus": "Analyzed", "descriptions": [ { @@ -85,8 +85,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-668" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-215xx/CVE-2021-21522.json b/CVE-2021/CVE-2021-215xx/CVE-2021-21522.json index 90f3c02f452..828dd5aa049 100644 --- a/CVE-2021/CVE-2021-215xx/CVE-2021-21522.json +++ b/CVE-2021/CVE-2021-215xx/CVE-2021-21522.json @@ -2,7 +2,7 @@ "id": "CVE-2021-21522", "sourceIdentifier": "security_alert@emc.com", "published": "2021-09-28T20:15:07.397", - "lastModified": "2021-10-04T14:11:38.380", + "lastModified": "2023-06-30T17:51:46.287", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "CWE-522" + "value": "NVD-CWE-noinfo" } ] }, diff --git a/CVE-2021/CVE-2021-228xx/CVE-2021-22864.json b/CVE-2021/CVE-2021-228xx/CVE-2021-22864.json index 8932b29836f..0cb2e4b571b 100644 --- a/CVE-2021/CVE-2021-228xx/CVE-2021-22864.json +++ b/CVE-2021/CVE-2021-228xx/CVE-2021-22864.json @@ -2,7 +2,7 @@ "id": "CVE-2021-22864", "sourceIdentifier": "product-cna@github.com", "published": "2021-03-23T22:15:12.423", - "lastModified": "2021-03-26T21:08:56.187", + "lastModified": "2023-06-30T17:50:26.783", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-77" + "value": "NVD-CWE-noinfo" } ] }, diff --git a/CVE-2021/CVE-2021-229xx/CVE-2021-22923.json b/CVE-2021/CVE-2021-229xx/CVE-2021-22923.json index ec8e625b453..504649d47b2 100644 --- a/CVE-2021/CVE-2021-229xx/CVE-2021-22923.json +++ b/CVE-2021/CVE-2021-229xx/CVE-2021-22923.json @@ -2,7 +2,7 @@ "id": "CVE-2021-22923", "sourceIdentifier": "support@hackerone.com", "published": "2021-08-05T21:15:11.293", - "lastModified": "2023-01-05T18:17:34.963", + "lastModified": "2023-06-30T17:47:16.583", "vulnStatus": "Analyzed", "descriptions": [ { @@ -68,6 +68,10 @@ "source": "nvd@nist.gov", "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-319" + }, { "lang": "en", "value": "CWE-522" diff --git a/CVE-2021/CVE-2021-229xx/CVE-2021-22948.json b/CVE-2021/CVE-2021-229xx/CVE-2021-22948.json index 8ee40f1813d..159094df4de 100644 --- a/CVE-2021/CVE-2021-229xx/CVE-2021-22948.json +++ b/CVE-2021/CVE-2021-229xx/CVE-2021-22948.json @@ -2,7 +2,7 @@ "id": "CVE-2021-22948", "sourceIdentifier": "support@hackerone.com", "published": "2021-09-23T13:15:08.760", - "lastModified": "2021-09-29T20:28:17.167", + "lastModified": "2023-06-30T17:50:34.397", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-327" + "value": "CWE-338" } ] }, diff --git a/CVE-2021/CVE-2021-238xx/CVE-2021-23874.json b/CVE-2021/CVE-2021-238xx/CVE-2021-23874.json index df08ef4e96b..397978abf4f 100644 --- a/CVE-2021/CVE-2021-238xx/CVE-2021-23874.json +++ b/CVE-2021/CVE-2021-238xx/CVE-2021-23874.json @@ -2,12 +2,12 @@ "id": "CVE-2021-23874", "sourceIdentifier": "psirt@mcafee.com", "published": "2021-02-10T11:15:12.943", - "lastModified": "2021-02-11T22:58:00.993", + "lastModified": "2023-06-30T17:49:58.287", "vulnStatus": "Analyzed", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "McAfee Total Protection MTP Arbitrary Process Execution", + "cisaVulnerabilityName": "McAfee Total Protection (MTP) Improper Privilege Management Vulnerability", "descriptions": [ { "lang": "en", @@ -89,8 +89,18 @@ }, "weaknesses": [ { - "source": "psirt@mcafee.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + }, + { + "source": "psirt@mcafee.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-242xx/CVE-2021-24209.json b/CVE-2021/CVE-2021-242xx/CVE-2021-24209.json index cd252b42e5c..5eb2bba4379 100644 --- a/CVE-2021/CVE-2021-242xx/CVE-2021-24209.json +++ b/CVE-2021/CVE-2021-242xx/CVE-2021-24209.json @@ -2,7 +2,7 @@ "id": "CVE-2021-24209", "sourceIdentifier": "contact@wpscan.com", "published": "2021-04-05T19:15:17.407", - "lastModified": "2021-05-04T15:02:12.937", + "lastModified": "2023-06-30T17:43:30.167", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,17 +65,17 @@ }, "weaknesses": [ { - "source": "contact@wpscan.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-94" } ] }, { - "source": "nvd@nist.gov", + "source": "contact@wpscan.com", "type": "Secondary", "description": [ { diff --git a/CVE-2021/CVE-2021-253xx/CVE-2021-25354.json b/CVE-2021/CVE-2021-253xx/CVE-2021-25354.json index 9dd6a16349e..f93265c1c7c 100644 --- a/CVE-2021/CVE-2021-253xx/CVE-2021-25354.json +++ b/CVE-2021/CVE-2021-253xx/CVE-2021-25354.json @@ -2,7 +2,7 @@ "id": "CVE-2021-25354", "sourceIdentifier": "mobile.security@samsung.com", "published": "2021-03-25T17:15:13.773", - "lastModified": "2021-03-30T21:16:48.487", + "lastModified": "2023-06-30T17:43:26.253", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2021/CVE-2021-263xx/CVE-2021-26314.json b/CVE-2021/CVE-2021-263xx/CVE-2021-26314.json index 3a22907114d..f1276b39475 100644 --- a/CVE-2021/CVE-2021-263xx/CVE-2021-26314.json +++ b/CVE-2021/CVE-2021-263xx/CVE-2021-26314.json @@ -2,7 +2,7 @@ "id": "CVE-2021-26314", "sourceIdentifier": "psirt@amd.com", "published": "2021-06-09T12:15:07.810", - "lastModified": "2022-06-03T13:45:52.813", + "lastModified": "2023-06-30T17:47:49.887", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "CWE-203" } ] }, diff --git a/CVE-2021/CVE-2021-274xx/CVE-2021-27499.json b/CVE-2021/CVE-2021-274xx/CVE-2021-27499.json index db73f6c0730..46ca6152a88 100644 --- a/CVE-2021/CVE-2021-274xx/CVE-2021-27499.json +++ b/CVE-2021/CVE-2021-274xx/CVE-2021-27499.json @@ -2,7 +2,7 @@ "id": "CVE-2021-27499", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2021-08-02T21:15:08.050", - "lastModified": "2021-08-11T13:17:40.970", + "lastModified": "2023-06-30T17:43:42.500", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-330" } ] }, diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20885.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20885.json index b1ee6118f6d..61e38a9381f 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20885.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20885.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20885", "sourceIdentifier": "security@vmware.com", "published": "2023-06-16T13:15:09.463", - "lastModified": "2023-06-16T16:41:02.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:12:51.393", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security@vmware.com", "type": "Secondary", @@ -34,10 +54,63 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pivotal:cloud_foundry_nfs_volume:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.0.27", + "matchCriteriaId": "708A44E3-874B-4A4F-9B91-432E7D4131BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pivotal:cloud_foundry_nfs_volume:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1.0", + "versionEndExcluding": "7.1.19", + "matchCriteriaId": "4887C1A5-6FD4-49C3-A33E-01BD57C785F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pivotal:cloud_foundry_notifications:*:*:*:*:*:*:*:*", + "versionEndExcluding": "63", + "matchCriteriaId": "17581E39-7468-41C0-A0F3-8247B35F36C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pivotal:cloud_foundry_smb_volume:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.1.19", + "matchCriteriaId": "14458EC9-C02D-4DB8-A93E-87C1057F0AA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cloudfoundry.org/blog/cve-2023-20885-cf-workflows-leak-credentials-in-system-audit-logs/", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2080.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2080.json index 106026999e9..10e47a55e83 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2080.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2080.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2080", "sourceIdentifier": "psirt@forcepoint.com", "published": "2023-06-15T23:15:09.020", - "lastModified": "2023-06-16T03:19:08.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:39:02.840", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "psirt@forcepoint.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "psirt@forcepoint.com", "type": "Secondary", @@ -46,10 +76,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:forcepoint:email_security:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9DD17A1-E6F8-4ED5-9566-C5C3A62EFCDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:forcepoint:web_security:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66F97068-979A-4D45-B2C6-A98FF1887EED" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.forcepoint.com/s/article/000041871", - "source": "psirt@forcepoint.com" + "source": "psirt@forcepoint.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21169.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21169.json index dfe7c844896..278e5360ead 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21169.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21169.json @@ -2,19 +2,74 @@ "id": "CVE-2023-21169", "sourceIdentifier": "security@android.com", "published": "2023-06-28T18:15:14.237", - "lastModified": "2023-06-28T19:27:43.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:50:07.150", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In inviteInternal of p2p_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-274443441" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2023-06-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21170.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21170.json index ea70975016d..9579ada85cf 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21170.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21170.json @@ -2,19 +2,74 @@ "id": "CVE-2023-21170", "sourceIdentifier": "security@android.com", "published": "2023-06-28T18:15:14.287", - "lastModified": "2023-06-28T19:27:43.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:52:59.093", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In executeSetClientTarget of ComposerCommandEngine.h, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-252764410" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2023-06-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21171.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21171.json index 416d718b8d6..8e835ea7041 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21171.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21171.json @@ -2,19 +2,74 @@ "id": "CVE-2023-21171", "sourceIdentifier": "security@android.com", "published": "2023-06-28T18:15:14.343", - "lastModified": "2023-06-28T19:27:43.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:58:56.977", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In verifyInputEvent of InputDispatcher.cpp, there is a possible way to conduct click fraud due to side channel information disclosure. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-261085213" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2023-06-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23539.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23539.json index 300a4554051..e83d0fb2cba 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23539.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23539.json @@ -2,19 +2,76 @@ "id": "CVE-2023-23539", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:10.843", - "lastModified": "2023-06-23T19:24:47.997", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:53:58.180", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.2. Mounting a maliciously crafted Samba network share may lead to arbitrary code execution" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.2", + "matchCriteriaId": "9CEC72CB-1F5B-4BF5-80F0-357E27855D2A" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213605", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2431.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2431.json index 4887a91e8a1..f92f2ae47e9 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2431.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2431.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2431", "sourceIdentifier": "jordan@liggitt.net", "published": "2023-06-16T08:15:08.770", - "lastModified": "2023-06-27T13:15:09.597", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:37:52.273", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "jordan@liggitt.net", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "jordan@liggitt.net", "type": "Secondary", @@ -46,18 +76,81 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.24.14", + "matchCriteriaId": "59A9CBF2-B94B-4311-AE41-6CEA2DA7E24B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.25.0", + "versionEndExcluding": "1.25.10", + "matchCriteriaId": "E2D70178-BDE0-430B-8446-0A93FB2323FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.26.0", + "versionEndExcluding": "1.26.5", + "matchCriteriaId": "D02A28B2-70E6-4B48-9D58-39525AD66C20" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.27.0", + "versionEndExcluding": "1.27.2", + "matchCriteriaId": "1C04A62B-D3F5-4E63-819A-0A8868F34643" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/kubernetes/kubernetes/issues/118690", - "source": "jordan@liggitt.net" + "source": "jordan@liggitt.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://groups.google.com/g/kubernetes-security-announce/c/QHmx0HOQa10", - "source": "jordan@liggitt.net" + "source": "jordan@liggitt.net", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBX4RL4UOC7JHWWYB2AJCKSUM7EG5Y5G/", - "source": "jordan@liggitt.net" + "source": "jordan@liggitt.net", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25188.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25188.json index 3b52f34310d..15e256e1093 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25188.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25188.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25188", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-16T19:15:14.477", - "lastModified": "2023-06-17T02:32:29.473", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:10:18.383", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "cve@mitre.org", "type": "Secondary", @@ -34,14 +54,81 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nokia:asika_airscale_firmware:19b:*:*:*:*:*:*:*", + "matchCriteriaId": "FE8E3A0E-3B21-49D8-A4EE-33FE5FBA7B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nokia:asika_airscale_firmware:20a:*:*:*:*:*:*:*", + "matchCriteriaId": "A612E565-7686-4C20-99AF-67B283328A42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nokia:asika_airscale_firmware:20b:*:*:*:*:*:*:*", + "matchCriteriaId": "5AE52024-F5EE-42F6-AC3A-702E87B1ABF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nokia:asika_airscale_firmware:20c:*:*:*:*:*:*:*", + "matchCriteriaId": "DA68A71E-A8FB-4448-BE75-318E4582FC43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nokia:asika_airscale_firmware:21a:*:*:*:*:*:*:*", + "matchCriteriaId": "B2FAA373-A46D-48A6-8A08-F66F4F3604C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nokia:asika_airscale:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61C0B724-C7EA-4214-98CF-49812292332B" + } + ] + } + ] + } + ], "references": [ { "url": "https://Nokia.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25188/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25499.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25499.json index c904bad1d5d..783ddf869be 100644 --- a/CVE-2023/CVE-2023-254xx/CVE-2023-25499.json +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25499.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25499", "sourceIdentifier": "security@vaadin.com", "published": "2023-06-22T13:15:09.660", - "lastModified": "2023-06-22T14:49:18.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:32:37.847", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security@vaadin.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + }, { "source": "security@vaadin.com", "type": "Secondary", @@ -46,14 +76,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.23", + "matchCriteriaId": "12F1F29D-69E8-406E-BB2F-EA3F141CECD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndExcluding": "14.10.1", + "matchCriteriaId": "B100421F-58C7-454A-949C-338C4B990925" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.0", + "versionEndIncluding": "22.0.28", + "matchCriteriaId": "D0719ACD-F9D0-4E28-82BC-AEFE4EB19729" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*", + "versionStartIncluding": "23.0.0", + "versionEndExcluding": "23.3.13", + "matchCriteriaId": "74BA613E-932F-45A3-88D2-EA8B42158429" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.0.6", + "matchCriteriaId": "7F7402D6-2F33-4352-9E70-16EA3C45B795" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha1:*:*:*:*:*:*", + "matchCriteriaId": "5131784E-6951-4BA6-A473-10BE06E3E0F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha2:*:*:*:*:*:*", + "matchCriteriaId": "07747F12-9827-4543-B66F-253326EC247F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha3:*:*:*:*:*:*", + "matchCriteriaId": "BD57A5F3-CB86-4B35-823B-DCAEB163D4CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha4:*:*:*:*:*:*", + "matchCriteriaId": "EB94F579-CDCE-4FA4-BCAF-7747813FB7A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha5:*:*:*:*:*:*", + "matchCriteriaId": "4464403F-682A-4506-99E7-2CC4E4288C0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha6:*:*:*:*:*:*", + "matchCriteriaId": "ECF91FB7-2806-40C1-B27D-461B6836AC7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:beta1:*:*:*:*:*:*", + "matchCriteriaId": "4ECE8939-9AB8-44AB-8ECC-96844410A973" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vaadin/flow/pull/15885", - "source": "security@vaadin.com" + "source": "security@vaadin.com", + "tags": [ + "Patch" + ] }, { "url": "https://vaadin.com/security/CVE-2023-25499", - "source": "security@vaadin.com" + "source": "security@vaadin.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-255xx/CVE-2023-25500.json b/CVE-2023/CVE-2023-255xx/CVE-2023-25500.json index 39e5420255e..a0a14705c0d 100644 --- a/CVE-2023/CVE-2023-255xx/CVE-2023-25500.json +++ b/CVE-2023/CVE-2023-255xx/CVE-2023-25500.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25500", "sourceIdentifier": "security@vaadin.com", "published": "2023-06-22T13:15:09.737", - "lastModified": "2023-06-22T14:49:18.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:32:11.590", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security@vaadin.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + }, { "source": "security@vaadin.com", "type": "Secondary", @@ -46,14 +76,122 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.23", + "matchCriteriaId": "12F1F29D-69E8-406E-BB2F-EA3F141CECD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndExcluding": "14.10.2", + "matchCriteriaId": "78FA5E6A-3D73-4CB9-8724-B7DBFC48A1B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.0", + "versionEndIncluding": "22.0.28", + "matchCriteriaId": "D0719ACD-F9D0-4E28-82BC-AEFE4EB19729" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*", + "versionStartIncluding": "23.0.0", + "versionEndExcluding": "23.3.14", + "matchCriteriaId": "9346B94F-48B9-429C-8976-DEC37B7D00F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.0.7", + "matchCriteriaId": "48E0C567-8C7F-4572-BC4F-F174C6058974" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha1:*:*:*:*:*:*", + "matchCriteriaId": "5131784E-6951-4BA6-A473-10BE06E3E0F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha2:*:*:*:*:*:*", + "matchCriteriaId": "07747F12-9827-4543-B66F-253326EC247F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha3:*:*:*:*:*:*", + "matchCriteriaId": "BD57A5F3-CB86-4B35-823B-DCAEB163D4CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha4:*:*:*:*:*:*", + "matchCriteriaId": "EB94F579-CDCE-4FA4-BCAF-7747813FB7A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha5:*:*:*:*:*:*", + "matchCriteriaId": "4464403F-682A-4506-99E7-2CC4E4288C0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:alpha6:*:*:*:*:*:*", + "matchCriteriaId": "ECF91FB7-2806-40C1-B27D-461B6836AC7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:beta1:*:*:*:*:*:*", + "matchCriteriaId": "4ECE8939-9AB8-44AB-8ECC-96844410A973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:beta2:*:*:*:*:*:*", + "matchCriteriaId": "30853513-0CB0-4AD2-B351-635834EA5C40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:beta3:*:*:*:*:*:*", + "matchCriteriaId": "6EA983BC-02B6-4F2F-A80B-6505529F8690" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "520B32C2-8D7C-4C6B-8384-4AD5EE575492" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vaadin:vaadin:24.1.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "32B73D72-C04F-4771-AC85-B6369A98685D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vaadin/flow/pull/16935", - "source": "security@vaadin.com" + "source": "security@vaadin.com", + "tags": [ + "Patch" + ] }, { "url": "https://vaadin.com/security/cve-2023-25500", - "source": "security@vaadin.com" + "source": "security@vaadin.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26062.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26062.json index f775dfa9285..ca8e41427ae 100644 --- a/CVE-2023/CVE-2023-260xx/CVE-2023-26062.json +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26062.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26062", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T20:15:09.383", - "lastModified": "2023-06-28T19:35:18.573", + "lastModified": "2023-06-30T16:10:12.110", "vulnStatus": "Analyzed", "descriptions": [ { @@ -76,8 +76,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:nokia:web_element_manager:*:*:*:*:*:*:*:*", - "versionEndExcluding": "sran_22r1", - "matchCriteriaId": "DFCC1576-B473-4ADE-9A1B-E4CD57384022" + "versionEndExcluding": "22r1", + "matchCriteriaId": "5B764A87-CB3F-4F9C-8AFE-20F8E3572695" } ] } diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26299.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26299.json new file mode 100644 index 00000000000..62e2193d383 --- /dev/null +++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26299.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-26299", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2023-06-30T16:15:09.543", + "lastModified": "2023-06-30T16:15:09.543", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in certain HP PC products using AMI UEFI Firmware (system BIOS), which might allow arbitrary code execution. AMI has released updates to mitigate the potential vulnerability." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_8642715-8642746-16/hpsbhf03850", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27083.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27083.json index fe3080462b4..5c901f27851 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27083.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27083.json @@ -2,19 +2,107 @@ "id": "CVE-2023-27083", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-22T20:15:09.213", - "lastModified": "2023-06-23T13:03:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:08:24.587", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue discovered in /admin.php in Pluck CMS 4.7.15 through 4.7.16-dev5 allows remote attackers to run arbitrary code via manage file functionality." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluck-cms:pluck:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.7.15", + "versionEndExcluding": "4.7.16", + "matchCriteriaId": "B41F06FF-81EC-4D18-A140-9E23D3D2A24F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.16:-:*:*:*:*:*:*", + "matchCriteriaId": "B69F46BD-10D8-497D-81FB-AF7A5B1FC55A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.16:dev1:*:*:*:*:*:*", + "matchCriteriaId": "202CB88D-BDA3-4F58-8CAB-6224367CA33B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.16:dev2:*:*:*:*:*:*", + "matchCriteriaId": "6C20AFCB-BF33-42E3-A735-E0B7E9C6D4E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.16:dev3:*:*:*:*:*:*", + "matchCriteriaId": "7CD1FF6D-A0F9-46CF-AF24-1CBC4F858D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.16:dev4:*:*:*:*:*:*", + "matchCriteriaId": "2A0E277D-0CB2-448C-9508-1E5719128EDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.16:dev5:*:*:*:*:*:*", + "matchCriteriaId": "B63818E7-30A0-4BEE-93B7-5B4942C4DD91" + } + ] + } + ] + } + ], "references": [ { "url": "https://medium.com/@syed.pentester/authenticated-remote-code-execution-rce-on-pluckcms-4-7-15-c309ac1bd145", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27396.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27396.json index 94b4e5ce93b..b31c40cec60 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27396.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27396.json @@ -2,43 +2,8641 @@ "id": "CVE-2023-27396", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-19T05:15:09.187", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:08:06.930", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "FINS (Factory Interface Network Service) is a message communication protocol, which is designed to be used in closed FA (Factory Automation) networks, and is used in FA networks composed of OMRON products. Multiple OMRON products that implement FINS protocol contain following security issues -- (1)Plaintext communication, and (2)No authentication required. When FINS messages are intercepted, the contents may be retrieved. When arbitrary FINS messages are injected, any commands may be executed on, or the system information may be retrieved from, the affected device. Affected products and versions are as follows: SYSMAC CS-series CPU Units, all versions, SYSMAC CJ-series CPU Units, all versions, SYSMAC CP-series CPU Units, all versions, SYSMAC NJ-series CPU Units, all versions, SYSMAC NX1P-series CPU Units, all versions, SYSMAC NX102-series CPU Units, all versions, and SYSMAC NX7 Database Connection CPU Units (Ver.1.16 or later)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cs1w-eip21_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4DF356A7-2A25-4C40-A94D-FC13C14AA610" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cs1w-eip21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A755464-0A9C-42CB-84D1-0884917C3DFA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cs1w-spu01-v2_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EDEBFF0E-1650-4A7C-B0A8-466D5AC6CF25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cs1w-spu01-v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14012509-D30E-4CE8-ADF6-A43CB343911F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cs1w-spu02-v2_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "32E48EB7-CA55-4CEF-BA4F-FBD1A0C77180" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cs1w-spu02-v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92FC82A-F5EB-408E-B856-F97692D93F4C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cs1w-etn21_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5526D627-C9F1-46D6-9930-C76149AC03BA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cs1w-etn21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D38C7C0B-790A-4E8B-855A-FD1FD8D53D29" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cs1w-clk_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "01421DD0-7A40-4343-9574-56A930BA8BB4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cs1w-clk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDFB9977-142A-4077-8931-A442BA87F94C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cs1w-fln22_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6A9A086D-913F-449A-A1AC-2BEDBB63FB3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cs1w-fln22:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D656C7D-8ADD-43E6-ADF3-250DB5DFDCCA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cs1w-drm21-v1_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6288965E-E2B3-4849-97C3-1C1784827A51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cs1w-drm21-v1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74A081EA-F91F-424D-BE54-65EC1F08BF78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cs1w-nc271_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73F2E3DC-A1A2-47CE-AB3B-C0918D09D59B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cs1w-nc271:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0E47AAC-72A5-40F1-BF3E-A3B6D8B85551" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cs1w-nc471_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "290DCB8D-9EBA-4B9B-916C-ECB3FDA5AEDA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cs1w-nc471:-:*:*:*:*:*:*:*", + "matchCriteriaId": "10C2B589-C642-4411-BEAE-819950622761" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cs1w-ncf71_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76246DA6-648C-4401-8F84-49D3C3F8D7D5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cs1w-ncf71:-:*:*:*:*:*:*:*", + "matchCriteriaId": "143EAABD-ED12-4482-9318-2BA7E112D629" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2m-cpu35_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C21B6EB4-5EEA-49D5-894D-A7AF5A2F6235" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2m-cpu35:-:*:*:*:*:*:*:*", + "matchCriteriaId": "603BAD60-89F1-4EE9-8413-F301DFC91AFF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2m-cpu34_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "150CFE2E-2646-4C7B-A011-3BF1A86056A3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2m-cpu34:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37C6982F-75F4-497B-8BF9-DC683304B43D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2m-cpu33_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F03690A9-9390-40B7-9F7F-88C1DB18D65D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2m-cpu33:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2ED8CAFA-62BB-4AC9-BAEF-C1FD50F57B1F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2m-cpu32_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1958B4E-7EFB-49BE-B9DE-4111052F34D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2m-cpu32:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD09E48C-5395-418F-8542-B0C00721CF97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2m-cpu31_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3162D73-3D0B-4495-97FE-18B9B736D288" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2m-cpu31:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5B09D3A-E765-46FE-8EAF-9A2FCFA42947" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2m-cpu15_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA721DFE-2ED5-458E-A56A-4AEB300921E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2m-cpu15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "812A58CD-8DF2-4917-8AF7-2175A03CAFCB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2m-cpu14_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14D29CAA-EC5D-4D17-AA15-04ABAA7E3F9A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2m-cpu14:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B928D93E-8AEF-4C3F-B7FD-16FFB657D933" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2m-cpu13_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93FE1E0-CEC0-450A-B371-C12073BBA2ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2m-cpu13:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC3CAE2B-2362-4BBF-B584-843BEA486724" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2m-cpu12_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "364C3E76-D6C0-4C85-97BA-7FA03DEA694E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2m-cpu12:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BA72EEB-2592-4E9E-BDDE-553A6A5A1CE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2m-cpu11_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF44D0B8-5362-48E7-9290-68FAB78DCAC4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2m-cpu11:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60CF6C18-6757-4597-848C-084A3AB4B75A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-cif01_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9F9E76E-78B5-4A5F-B2AE-8B8ED5E332A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-cif01:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C24EE46F-9E34-431F-92DC-04EE7019BD18" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-cif11_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FAD09B6-C4C5-4B1C-8EB5-C030CE829562" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-cif11:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D7C1C6-14EE-4C18-9880-6C1C8F187CC0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-cif12-v1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "641A8175-C2DA-477E-A411-3D1E8FA58C2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-cif12-v1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4644BE0-A824-491C-AC02-2992F3BCBB90" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2m-md211_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1444556-6113-4F55-9F20-059D7E5F2816" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2m-md211:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E5CD1EAA-8BA1-4345-B24C-B25BFDE7EB3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2m-md212_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5560C42C-F02A-41A5-9D7D-C519A1B03C96" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2m-md212:-:*:*:*:*:*:*:*", + "matchCriteriaId": "929D4420-5251-4194-AC7B-B01C0B69D6EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2h-cpu68-eip_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E97B8B4B-34CC-491F-A754-D68C46D056EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2h-cpu68-eip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B08AA4C-6F83-4387-A5FD-F49C54D9545F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2h-cpu67-eip_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0C4D82E-E8B9-49E0-A632-3BA1BE703FA6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2h-cpu67-eip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4530B900-322D-4B9E-AA34-D63CA546190A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2h-cpu66-eip_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F2A7ABD-0097-4AEB-85ED-AE38A1E66A87" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2h-cpu66-eip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51114B75-A8DD-49F4-8AC3-BA46C1D4F89C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2h-cpu65-eip_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FD2F8C9-8D52-41CF-B3DE-E5E2EB177DBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2h-cpu65-eip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "871B2A06-6AAC-43DF-AF1A-848E9C804016" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2h-cpu64-eip_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79FBECF6-C09A-4F7E-99F1-A9A4AAE6BF45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2h-cpu64-eip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D2D2A32-4326-4357-A400-EA26B362D821" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2h-cpu68_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "510AAD1A-1699-444A-965B-D8DE5E224073" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2h-cpu68:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BE3CB2E-33A8-412F-8BA3-2EFE6680ADA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2h-cpu67_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "445DCB52-88C1-47A9-8393-666D9D82A907" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2h-cpu67:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34974C09-BD68-470A-9E98-5E4B69F9D0AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2h-cpu66_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1DDCB792-2436-4938-A0D0-DD28DD130000" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2h-cpu66:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F41E672-1296-43F6-A620-F8D62C01F134" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2h-cpu65_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E53EA32-5969-42D3-ACD8-D1F35125F9D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2h-cpu65:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1909B984-6D2B-44A7-AA8E-6619127C17DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cj2h-cpu64_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB7FD1EB-F3DA-4838-A389-E25C7C584EA4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cj2h-cpu64:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5C57458-F47E-4780-90E4-917A43E30642" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n14dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB608444-9385-497E-98A3-BDEFA456DC41" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n14dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6465F0BE-88A7-42A8-BC98-7E4A8C7E1BD1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n14dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA9A11D4-F3C4-46A2-9167-B2F87749943A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n14dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A1F95C6-66C4-4813-A14D-FEC068BB9837" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n14dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E36A396F-7178-40F1-9F3D-D93D271C6193" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n14dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "244D6379-326D-45A1-B60E-2E4B1D4F8459" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n14dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3ACEC0C0-0254-4BF5-903C-09D0B5C35E2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n14dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCE0E18B-57BB-48DD-902D-22413DB4E35D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n14dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F934EAA5-E84E-45A9-AE8A-F2C862220DF1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n14dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99FEDEA0-4D3A-4027-9DF5-05E977F1F42F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n20dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F582C34-11D4-4B2F-BC98-5D133E9DCAB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n20dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84BC2EF9-F31F-4D46-8297-DF4FCA9DDD80" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n20dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0C6C336-CEB3-48B7-B6BB-0E3AAA805033" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n20dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1998D9D0-3C9F-434F-A16D-2D12B32878A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n20dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "10A48ABF-4702-4445-84C8-B0597007F36B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n20dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9010781-DF2D-4F03-920A-B2D4122A068F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n20dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FBF5B0B-20EA-4843-B9CB-C3C8BF969945" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n20dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82FD4532-2535-4569-A015-90CC863618A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n20dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "235D2763-9890-4CF5-90B5-E769EA6D7305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n20dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86E0D296-3DD2-4CDF-A6FD-7EBF74B9AFB1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n30dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4ACFE367-7793-40FC-BFC3-523EE042DCB1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n30dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45EDEA3C-28EC-4C0D-9ECE-112F70A14F38" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n30dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6935D46A-24CB-4B82-858B-4F382D7E37F0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n30dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0504FA24-665C-4DAE-937D-FA6604F7A179" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n30dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "908E95AA-A209-4425-987D-8EE800207058" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n30dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4805B6CF-C6F6-4D86-BC4C-A01CA43DECBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n30dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8EF817C8-A72F-4C4D-A632-B4B537F8120C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n30dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44189F31-0642-4E62-85E9-55668F5A9325" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n30dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C1AC82CF-97DB-41DF-B7AC-81BF8A2F7263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n30dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3941916-85F2-4E1D-965E-31DC253108EC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n40dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E6F1DD4-20D8-4FA6-921C-5C42BFE5250D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n40dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "666286BE-C562-49CF-8627-6DA82A7765CA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n40dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4972C07B-9CF8-4713-A385-209BF9B0918F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n40dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B821F1E1-5C12-4CD2-B8F6-FF82E8D206BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n40dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50ED749B-D11F-4D9E-B3DF-C38340A12C25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n40dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4897A60B-5C78-4195-8904-6A65CCB265F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n40dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AA5062B-01DA-4CCA-9643-257EAA5C673A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n40dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1325C00E-D94A-49A7-A8F3-777A88CBE5AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n40dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9234AA35-AD34-46AF-B4BB-A390C0E1A9CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n40dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F276D92-FCF1-4DC7-9CE1-D7FBB5921B40" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n60dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74A80AB7-37AE-4506-9FDB-FBC0B953DBE0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n60dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18A53B0E-C4F8-4E9E-91A8-66AA201467B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n60dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "24431CB0-D26F-498C-953C-67B17A0619D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n60dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DB08F11-CCA2-4E1B-BC64-CADD9941FC02" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n60dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0C1A64F-27CD-427D-B66D-FE62FB017A4B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n60dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C48BD4CB-FF4D-4FB1-AF8A-FB860A7A1736" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n60dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4697D68D-72BA-42C6-A390-83DF205F90C5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n60dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CC0409F-9B32-45E9-BA9E-48796DBDC4A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-n60dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E9B68BB-296E-4A21-A9BD-51F4F3A69D4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-n60dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7385B77-3427-42FF-A1CF-365C66F0A3E3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-s30dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7E52162-47C1-4826-BE9B-6CA2D1D83936" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-s30dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47872540-5250-41CC-985B-A34899C7FAB9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-s30dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC94F22D-6293-4F73-815F-E60BD8951BC0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-s30dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A515F824-0001-4ADD-8BA6-C1F233A76DB9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-s30dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D64BF6F0-C0DA-4E81-B0EC-F23E28C937C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-s30dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6EBF06D4-6C39-4380-8F98-414B5D13103B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-s40dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93A6CEBD-78B6-4285-ABE2-7C439198FB45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-s40dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F565E4E0-CEAE-4FAB-96A5-9012DD04CDC1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-s40dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16055592-6C99-4B62-9D4C-291646AA90DD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-s40dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A02B89A1-743A-469B-AE4E-38354F1B5788" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-s40dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACBF15CB-A9DD-4768-A0F6-C72C2BC268E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-s40dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA69EFBC-90BE-41FC-AB30-D29FA423D9FD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-s60dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AA00837-FE82-4F3D-8BE1-A06E0714911E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-s60dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FCE7C4C-E68A-4643-AC14-DEA967D4217C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-s60dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D2C1FA0-12D0-4C08-98B2-E98A2D37016C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-s60dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABB2928D-6635-4EA4-871C-1297544DD269" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-s60dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D502CF52-5A5A-4C84-937D-2AB95BC718E9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-s60dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D9582D0-9EBD-40E6-8EB0-3B0FF0922761" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-e14dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A51AF814-6BDF-417C-9BB2-15726905B9AD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-e14dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C8EA0C3-7639-4012-816F-6BD5D2CC0083" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-e20dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88ED2553-8F68-400C-A954-76AAB89A45BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-e20dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B83EA6E-E594-4D0B-AEB2-A5E9B19CCFCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-e30dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B6B1D4A-D59F-40FF-BB8A-A45A2B91DA6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-e30dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6250657C-B977-4335-A214-2EFD1D879FDD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-e40dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D01177B7-197D-43B3-8237-0CEEFC127CCE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-e40dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63090381-36DD-49CC-9C5B-0B32B4F6FAEC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2e-e60dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD816019-B818-4CF7-A4E5-F26376C085F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2e-e60dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34607F05-4FB1-49BA-A3F2-AB1931478571" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-cif01_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9F9E76E-78B5-4A5F-B2AE-8B8ED5E332A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-cif01:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C24EE46F-9E34-431F-92DC-04EE7019BD18" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-cif11_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FAD09B6-C4C5-4B1C-8EB5-C030CE829562" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-cif11:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D7C1C6-14EE-4C18-9880-6C1C8F187CC0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-cif12-v1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "641A8175-C2DA-477E-A411-3D1E8FA58C2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-cif12-v1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4644BE0-A824-491C-AC02-2992F3BCBB90" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2w-cifd1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E77BB94-E1C3-4B17-95DA-91A87502B592" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2w-cifd1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B45205C-2936-4208-BB81-5073941C7393" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2w-cifd2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9AE253F-974D-4747-866E-54C54FE5C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2w-cifd2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6C03251-46D2-4322-8848-D2AE904AF0EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp2w-cifd3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2701CA9A-4D63-410D-839B-ECB2C1C615E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp2w-cifd3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "24B2353F-64AA-4311-9B6F-55A5062A17E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-adb21_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36EC30B0-9D2E-4406-A7BB-EBEA10845997" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-adb21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4B1CFC4-02E7-4E55-B0E1-94984E406AA2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-dab21v_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C292268-3CEA-4584-9B86-0794FC288D5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-dab21v:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98DE6E53-F26E-4388-92FB-8E7E9F6E269E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-mab221_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6517AE3F-3867-4D58-B540-1E5E14230E9A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-mab221:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E48671F-D344-4A52-B484-188EE295AA95" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-8ed_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F35213D5-A7FA-42BD-A810-6E0B6BADA1D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-8ed:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F108D6BC-F4BB-44D7-B7DC-00DEC96A3515" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-8er_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9194953-D937-44EC-8B96-9673DB4B8DFB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-8er:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6EFDC367-3DD4-4C3C-90BB-4679A114EE8B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-8et_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "678699FA-CDEE-4616-9865-3648B063E569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-8et:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4FAF7E3-D7D1-41AF-A136-15F69F1F28BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-8et1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0160BB29-1289-4502-94CA-E854DF6D70F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-8et1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18A619C7-7DAA-4ACB-BBFF-99FE7DC57030" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-16er_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72F5F43F-71A4-40FE-A18B-35E9F7583175" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-16er:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4AD1C07-E367-43AE-A25B-F22DB672D00E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-16et_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C1665A9D-EDBE-4EDF-BBE7-56A2DAD1DDD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-16et:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F19A3A1E-1657-4408-872D-46D9715BE25C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-16et1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95543E4C-42DB-4EBC-BD7C-C01B8CE8A625" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-16et1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AA1DBB1-21C6-49D6-AFF6-B27CB4725ECF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-32er_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C76FDCB-DF02-48B2-BBD9-8495A4E3713B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-32er:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8EDF47-3BA4-45ED-92F2-B351806CFC20" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-32et_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0ECBA4B-997D-4AD1-938D-840EC87AD23F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-32et:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11862D29-80F7-453F-A786-3A1928E2504E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-32et1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4426B45-DD78-4B87-8199-4D1682506671" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-32et1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D20002F-6ACC-4879-9D43-F20DECFC2C97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-20edr1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "537A798A-7C4C-45D8-8F27-8F2F29C9814C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-20edr1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD8BC2A8-004B-46DC-9E85-A777F5A22966" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-20edt_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "531378F6-92A8-4481-8F71-3A2CB7905356" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-20edt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B8C5F37-0C04-4D59-BE12-4CBECDC8D7B6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-20edt1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB3DB627-974F-465D-9719-95285A09C953" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-20edt1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F85DFAD7-27E0-40E3-AA5B-0FB08E67B308" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-40edr_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82CDB838-D12E-4F3B-925C-999A8D42BA92" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-40edr:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41A3EAB5-2047-4329-B466-A6E5F397EF3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-40edt_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1479B99A-36EC-437A-8E6F-27D77B9FA6E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-40edt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C058D7A9-1F27-4D0C-BD30-D8523164DE04" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-40edt1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF596236-F93B-4F89-B583-608525FB5EF2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-40edt1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E675248B-0DBF-4658-90BD-DF50F37FFD6F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ad041_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5898687D-7B33-4630-B3B3-F13EABA39F8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ad041:-:*:*:*:*:*:*:*", + "matchCriteriaId": "400C2D9E-0D39-4A37-891E-C24CACB4A6B5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ad042_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7EA8B990-17B8-4134-8E70-2D5B4EDD1C95" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ad042:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05D1883D-B0BF-4C72-BA3C-20BB9DD98334" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-da021_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5121C028-6BEF-4609-BD4C-C584ECBB00F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-da021:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9ADB816-19F3-4869-B5ED-B6762DF7C3B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-da041_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02F689C8-10A7-4B50-90DA-286C8C372C84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-da041:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1EC71C3-B551-4580-AB84-5275FBC5C955" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-da042_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DCEC5D7-9847-48AE-8009-41BDC34C7383" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-da042:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8746B9EE-A904-45E0-B744-F822610A9BE1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-mad44_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E35091D-2701-4586-A38D-09ACA3183208" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-mad44:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E62C10A9-C1C3-473D-8F92-8BBD095A5F81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-mad42_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87004958-2FE4-4F95-8301-935D78F16775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-mad42:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECDFF07E-E46C-4610-B9A3-F7A11B27DDB6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-mad11_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA8FBAB6-3066-45FE-9DFE-8C9D96D85129" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-mad11:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FE4291A-08FB-4195-97E9-1C5F7AF6E090" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ts001_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E1562FF-AAF5-4FB9-90C9-6B8F57CC69B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ts001:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26F03906-11D3-4BE3-846A-383C7CEAEFC6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ts002_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39226095-C9A0-411B-8245-0762B9F4E350" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ts002:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9499E654-7C96-4F3D-A887-FAC0BF4CCB56" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ts101_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FEDB02F3-5B03-493E-908B-44B63564EE4B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ts101:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB7ACBF0-C41F-4981-B75A-3C64358EB3B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ts102_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB8E554D-395D-4767-9A6F-D7683655B30B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ts102:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BA2954C-9226-42D8-A71B-C15D994A7F5A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ts003_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB63BB1B-DF7F-4FE2-ABE6-6C14D7372E74" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ts003:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72D1E1FA-8417-4876-94A8-5025DF6DAEFA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ts004_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2C5D107-617D-4FF9-B2D4-591BF3630ACD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ts004:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EB450FA-7975-48A7-9AE1-4D1CFE338E69" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-cn811_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "583539C4-974F-42AA-9BFF-D7D53765BDD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-cn811:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55FD628E-66AA-4097-A0B7-38859D48F483" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1h-x40dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2C96D30-A8B1-4832-BDE8-A6D6FB235E14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1h-x40dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD8A8F06-194E-47C2-B744-681583159AA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1h-x40dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D834D547-A073-4389-B056-97A50271B4E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1h-x40dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "591C0C4A-472B-4B5A-B037-1557C8146363" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1h-x40dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E63C5891-ECC5-46D7-85F4-8DD412BE0517" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1h-x40dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D8C9A46-B3C9-468C-AC51-A24D1E439B4C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1h-xa40dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F2D8EBD-7760-4BF9-9B6A-22C3CEC42EE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1h-xa40dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B97EC842-0EB1-4D33-A4BC-FC1D4F7BE07D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1h-xa40dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA7DD6B3-5298-4843-A25D-4B5374F646E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1h-xa40dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6D000A8-A72B-4877-B037-D2042E6BBEFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1h-xa40dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CA4E343-6345-4A81-8052-0D0E0CA238B5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1h-xa40dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDE5C84E-2F8B-439C-8A0D-465B7CB2F71F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1h-y20dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C7B3D8A-CDDA-4F38-A7BA-577C7A27DAB5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1h-y20dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C380AF7F-150B-468E-AB8C-F1F1077DF709" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-cif01_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9F9E76E-78B5-4A5F-B2AE-8B8ED5E332A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-cif01:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C24EE46F-9E34-431F-92DC-04EE7019BD18" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-cif11_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FAD09B6-C4C5-4B1C-8EB5-C030CE829562" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-cif11:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D7C1C6-14EE-4C18-9880-6C1C8F187CC0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-cif12-v1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "641A8175-C2DA-477E-A411-3D1E8FA58C2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-cif12-v1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4644BE0-A824-491C-AC02-2992F3BCBB90" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-cif41_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99A34BA8-7D88-4D08-A8F0-99570A397299" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-cif41:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83911864-386F-40A2-BB2D-7E3443E3EDB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-dam01_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3AD0C07-7071-4128-8A2E-526409FB4A8B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-dam01:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D7107E9-9D3D-4F5F-8692-301806A68082" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-me05m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A62623A-7141-466B-8204-5EE5270AE57F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-me05m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA718651-4926-41C5-B115-A56F39A9A7DD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-8ed_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F35213D5-A7FA-42BD-A810-6E0B6BADA1D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-8ed:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F108D6BC-F4BB-44D7-B7DC-00DEC96A3515" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-8er_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9194953-D937-44EC-8B96-9673DB4B8DFB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-8er:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6EFDC367-3DD4-4C3C-90BB-4679A114EE8B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-8et_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "678699FA-CDEE-4616-9865-3648B063E569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-8et:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4FAF7E3-D7D1-41AF-A136-15F69F1F28BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-8et1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0160BB29-1289-4502-94CA-E854DF6D70F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-8et1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18A619C7-7DAA-4ACB-BBFF-99FE7DC57030" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-16er_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72F5F43F-71A4-40FE-A18B-35E9F7583175" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-16er:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4AD1C07-E367-43AE-A25B-F22DB672D00E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-16et_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C1665A9D-EDBE-4EDF-BBE7-56A2DAD1DDD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-16et:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F19A3A1E-1657-4408-872D-46D9715BE25C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-16et1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95543E4C-42DB-4EBC-BD7C-C01B8CE8A625" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-16et1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AA1DBB1-21C6-49D6-AFF6-B27CB4725ECF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-32er_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C76FDCB-DF02-48B2-BBD9-8495A4E3713B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-32er:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8EDF47-3BA4-45ED-92F2-B351806CFC20" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-32et_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0ECBA4B-997D-4AD1-938D-840EC87AD23F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-32et:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11862D29-80F7-453F-A786-3A1928E2504E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-32et1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4426B45-DD78-4B87-8199-4D1682506671" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-32et1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D20002F-6ACC-4879-9D43-F20DECFC2C97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-20edr1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "537A798A-7C4C-45D8-8F27-8F2F29C9814C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-20edr1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD8BC2A8-004B-46DC-9E85-A777F5A22966" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-20edt_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "531378F6-92A8-4481-8F71-3A2CB7905356" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-20edt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B8C5F37-0C04-4D59-BE12-4CBECDC8D7B6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-20edt1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB3DB627-974F-465D-9719-95285A09C953" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-20edt1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F85DFAD7-27E0-40E3-AA5B-0FB08E67B308" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-40edr_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82CDB838-D12E-4F3B-925C-999A8D42BA92" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-40edr:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41A3EAB5-2047-4329-B466-A6E5F397EF3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-40edt_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1479B99A-36EC-437A-8E6F-27D77B9FA6E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-40edt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C058D7A9-1F27-4D0C-BD30-D8523164DE04" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-40edt1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF596236-F93B-4F89-B583-608525FB5EF2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-40edt1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E675248B-0DBF-4658-90BD-DF50F37FFD6F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ad041_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5898687D-7B33-4630-B3B3-F13EABA39F8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ad041:-:*:*:*:*:*:*:*", + "matchCriteriaId": "400C2D9E-0D39-4A37-891E-C24CACB4A6B5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ad042_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7EA8B990-17B8-4134-8E70-2D5B4EDD1C95" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ad042:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05D1883D-B0BF-4C72-BA3C-20BB9DD98334" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-da021_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5121C028-6BEF-4609-BD4C-C584ECBB00F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-da021:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9ADB816-19F3-4869-B5ED-B6762DF7C3B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-da041_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02F689C8-10A7-4B50-90DA-286C8C372C84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-da041:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1EC71C3-B551-4580-AB84-5275FBC5C955" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-da042_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DCEC5D7-9847-48AE-8009-41BDC34C7383" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-da042:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8746B9EE-A904-45E0-B744-F822610A9BE1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-mad44_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E35091D-2701-4586-A38D-09ACA3183208" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-mad44:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E62C10A9-C1C3-473D-8F92-8BBD095A5F81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-mad42_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87004958-2FE4-4F95-8301-935D78F16775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-mad42:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECDFF07E-E46C-4610-B9A3-F7A11B27DDB6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-mad11_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA8FBAB6-3066-45FE-9DFE-8C9D96D85129" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-mad11:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FE4291A-08FB-4195-97E9-1C5F7AF6E090" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ts001_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E1562FF-AAF5-4FB9-90C9-6B8F57CC69B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ts001:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26F03906-11D3-4BE3-846A-383C7CEAEFC6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ts002_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39226095-C9A0-411B-8245-0762B9F4E350" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ts002:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9499E654-7C96-4F3D-A887-FAC0BF4CCB56" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ts101_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FEDB02F3-5B03-493E-908B-44B63564EE4B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ts101:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB7ACBF0-C41F-4981-B75A-3C64358EB3B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ts102_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB8E554D-395D-4767-9A6F-D7683655B30B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ts102:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BA2954C-9226-42D8-A71B-C15D994A7F5A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ts003_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB63BB1B-DF7F-4FE2-ABE6-6C14D7372E74" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ts003:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72D1E1FA-8417-4876-94A8-5025DF6DAEFA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ts004_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2C5D107-617D-4FF9-B2D4-591BF3630ACD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ts004:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EB450FA-7975-48A7-9AE1-4D1CFE338E69" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-srt21_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43F00779-2FF7-4BF7-915A-E67A1442846B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-srt21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B872F43-9662-4F7C-B11B-334DE8DE71C6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-cn811_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "583539C4-974F-42AA-9BFF-D7D53765BDD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-cn811:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55FD628E-66AA-4097-A0B7-38859D48F483" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-ext01_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A184CFA9-C81D-42E8-844E-EB790727685E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-ext01:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D26EBD1E-73F1-49F7-9FA6-EC9954F0371F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-em40dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E88BB7C7-221B-49E2-AC36-D1B23FA8490F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-em40dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5F07FDF-DD9E-4A06-965C-A9BCDF05604C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-em40dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6283CC2C-147A-4AC8-AB99-FC7B4EEEF06F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-em40dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A76562B7-5B28-4BFC-87C0-C6C42B143C50" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-em40dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A503FA51-9D61-4494-9D6C-7DB9D18427BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-em40dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A704290A-BFE2-4EC4-A182-0DE082ABE5F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-em30dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79957748-AC2F-4B32-B145-12B084149A09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-em30dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FF8A3C3-427B-4FDC-AC10-7B8CD4D9567D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-em30dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9176830-122B-47EA-8658-A3A558DEEBF2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-em30dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C64500CB-631B-46F7-AF8B-850A59CA1318" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-em30dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "040DD191-B210-48BF-A17B-A112FA635799" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-em30dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85F0F6CA-8C0C-4535-9BDD-E0AEC8D590FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-el20dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E7D6DBD-4AE4-4FE8-B46E-D21EF8FFE95C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-el20dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19CDC56E-7D29-49A4-B20B-6BDA7CF8A726" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-el20dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39C8CB54-388E-4BB7-900E-879C58B92220" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-el20dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF24992E-777B-492A-A7FF-0DA045E2287F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-el20dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03A187AD-3478-4082-BF70-9D47A4B67DBA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-el20dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55680931-0A29-4A16-A929-6F2B42D5C8E6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-m60dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8F56C00E-9793-41A1-9C11-4A05E4ABDEF5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-m60dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6F83A38-5A9F-4DE5-8C43-557459FB48AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-m60dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF9425E8-4C58-4B62-9298-C64065980F3D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-m60dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FBEBBAE-178B-403D-8520-88E30738E260" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-m60dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "759F9F1E-F961-416B-8CEF-5C6D078BF828" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-m60dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBBD003D-85CF-4C70-97AC-B7C77804D099" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-m60dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACD23815-FBEA-4804-BFD5-3817C1C3508F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-m60dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81F052D3-7B63-4020-BD0D-6E469F1EB9F1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-m60dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA0CF690-8901-48DE-96E6-B5F98A949A8E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-m60dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7B3250B-6EDB-4598-B0F9-A4C24F3E8301" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-m40dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "852C4393-9A66-4E54-9AB9-4C0995B31D17" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-m40dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1831882-D1DE-49BF-BF3B-90164435E6B7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-m40dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E01A7CD-3D31-41C9-A6D2-D5E7F39065C0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-m40dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F6A19BC-67EA-449B-866E-D83C57E19497" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-m40dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "219AC5A2-35F5-4BC9-9EF7-532C558A5A31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-m40dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D82D8DF4-08D0-4211-B668-252E9A34B423" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-m40dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0FC1347-806B-473A-B043-C40731AA6E9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-m40dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDC29030-8FDC-49E2-895F-9E756DBF31AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-m40dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45166010-5299-4EC9-A322-319E353C0509" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-m40dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D89FC82-6245-488D-BA53-CA7C5872E336" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-m30dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4035BD35-206B-4B1D-9674-E9249F91A103" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-m30dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A952385-9C64-4FA9-85A3-3D6B662B6FCA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-m30dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "266646C9-1F26-4A1A-ACA0-DB10B5187E9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-m30dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E629759-6A50-4922-86F1-CE7B479D4E6D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-m30dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3534B6E-9881-4A91-972D-46DFDEC03081" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-m30dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC519BB0-EC5C-4C73-96E5-A1354CD5918E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-m30dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED844EDC-EEC5-4EB6-AF03-42072B2C183A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-m30dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52402256-5922-4841-8659-9D7DD2C5B329" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-m30dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC61E0E1-9A00-4810-9A99-CCD5F66569EB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-m30dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE16658D-67C8-4EC3-9E0E-6D0A6DD0B255" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-l20dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D7E2831-3F02-40F4-8D01-B0114AD99B90" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-l20dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B04DEBD5-AB51-4158-A840-087BA005E6CE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-l20dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEE88180-1651-4248-8FC8-99F4D1CC8FEC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-l20dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFD893F5-6C95-4059-AFEA-041459ABF2D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-l20dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E42B323-FE48-483A-BC3E-9F42A9BAE16B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-l20dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "416D63EE-C8A6-434D-9C7B-D62FFCEB06A1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-l20dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B985B99-A1D6-4C38-9955-18D84CE45C0D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-l20dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A5A3F76-A88D-4353-9989-FCD4852F4633" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-l20dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF9A3682-C64E-4D93-9ACA-9233C2B52B18" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-l20dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03075648-4B8D-44F9-A8FA-BE9BEB5AE277" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-l14dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71875E95-3DCB-4332-9CA9-4ACD93CF09AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-l14dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9AA5721F-F4E6-4E6C-AAF2-74FED438E4A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-l14dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70FD1FB1-6503-4206-87C6-C541BFB383EB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-l14dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C34A2300-BAF2-4CF1-9E12-1D07E79F672F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-l14dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B79FC23-03B7-49DB-AC8D-D15B988A926A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-l14dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E5B5396-4DF2-4C59-B2C2-2843C9D8A065" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-l14dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A976982C-886B-4183-8B69-B3BA8EB99981" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-l14dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AEE1C559-FF3C-42D8-83DA-5EEEE1D25200" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-l14dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E51C366-FA31-4725-9897-427C3AC8CF9B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-l14dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F9736E5-2DA9-4206-AC81-E5746F4C2FAF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-l10dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1DDD6F3C-76B6-4CDF-897A-7BFB963207E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-l10dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9898157-B181-4542-BC19-66E1DC2AB737" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-l10dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A555EF97-4842-4B4E-B812-37CCAFFF4843" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-l10dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A71316-F722-4088-B67A-2CB5BBEDE454" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-l10dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D209E7CB-529A-4795-90F9-091D2E89D624" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-l10dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A4C2465-E110-425A-8FC0-5DDCE45E7788" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-l10dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7147D522-A83D-4D73-B863-9395B015EAD5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-l10dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEE5C2C6-2CDC-4953-99A2-8589870D0220" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1l-l10dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FBFA7D70-BAF2-463D-B7C3-FBB7D5C9B08E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1l-l10dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B3A4497-2992-49B3-8D03-2DF0478447D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-cif01_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9F9E76E-78B5-4A5F-B2AE-8B8ED5E332A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-cif01:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C24EE46F-9E34-431F-92DC-04EE7019BD18" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-cif11_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FAD09B6-C4C5-4B1C-8EB5-C030CE829562" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-cif11:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D7C1C6-14EE-4C18-9880-6C1C8F187CC0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-cif12-v1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "641A8175-C2DA-477E-A411-3D1E8FA58C2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-cif12-v1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4644BE0-A824-491C-AC02-2992F3BCBB90" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-cif41_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99A34BA8-7D88-4D08-A8F0-99570A397299" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-cif41:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83911864-386F-40A2-BB2D-7E3443E3EDB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-adb21_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36EC30B0-9D2E-4406-A7BB-EBEA10845997" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-adb21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4B1CFC4-02E7-4E55-B0E1-94984E406AA2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-dab21v_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C292268-3CEA-4584-9B86-0794FC288D5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-dab21v:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98DE6E53-F26E-4388-92FB-8E7E9F6E269E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-mab221_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6517AE3F-3867-4D58-B540-1E5E14230E9A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-mab221:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E48671F-D344-4A52-B484-188EE295AA95" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-dam01_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3AD0C07-7071-4128-8A2E-526409FB4A8B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-dam01:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D7107E9-9D3D-4F5F-8692-301806A68082" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1w-me05m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A62623A-7141-466B-8204-5EE5270AE57F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1w-me05m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA718651-4926-41C5-B115-A56F39A9A7DD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-e14sdr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB30CE10-0181-4F26-8E9D-8975F86E6785" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-e14sdr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "232D54D9-B2FE-4B03-9ACE-7A87E09AAFE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-e20sdr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA61C8AA-CBC1-4880-B182-5C377D6FB13D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-e20sdr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14DA49A2-175E-4212-BD0F-84AAD5CC9FDB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-e30sdr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FBD48529-36A9-439E-8622-3389C0EF841C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-e30sdr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DEF3D808-9144-48E9-97B2-AC922BE2F219" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-e40sdr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA60E0F4-B5F9-406E-BA73-38841774B542" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-e40sdr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "30B293A3-C947-43C7-881E-14FF09965941" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-e60sdr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B436C78-D18C-4B8B-83B2-47B676A3A713" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-e60sdr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82656463-130A-4BC8-8CAB-F46706700EF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-e10dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D6066EF-AE4D-4466-8E54-5E90233319CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-e10dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80AC19A1-90AE-4000-9321-F5021AE1EA8A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-e10dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "360D2E72-CC3B-4A33-B40D-A99F4AA42E3A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-e10dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCDEC50D-B012-4F92-85FC-D3A67F250641" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-e10dt1-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0BD0FFD-0F67-4A27-9D2E-2D5E1FC7896C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-e10dt1-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C33F163-8E07-46CB-BC97-2C11F696369D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-e10dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BF0FD45-8CF5-439F-B113-A3953BEF6CD8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-e10dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "751C19B6-ED6E-4BBC-9D2B-36A1858F7A0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-e10dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E130E5AB-DF5F-4E21-B077-8B6E9DB4F951" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-e10dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5494345E-868C-43E8-850A-546E85763E71" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-e10dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18CBC699-A14F-4566-BC4C-7DE0D2C58918" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-e10dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "870930A7-7468-4BAA-B07D-A385CC0FA217" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-e14dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFB4049D-CF51-4E71-9776-CFB4A5D9D6BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-e14dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86316222-5304-41A1-8335-FBFBDF0F675A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-e20dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D95F0C3-CBE4-4CD2-8021-EAFECC982CEC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-e20dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF22BCDA-A3AF-4052-B2AE-27DE56280C7F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-e30dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9415F7C2-BFCC-4798-A5AE-E08B72D5A260" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-e30dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7E46C62-C3E1-4DE1-9C8B-EEC8CC4E015E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-e40dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAC91A5D-793C-4EC3-9C79-7D716501079A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-e40dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "252AC3F4-9E7F-4E17-9DB4-1CEA4D720D4A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n30s1dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8F3AC1A2-5EF6-4A31-8DC1-04CCA0EF96C8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n30s1dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFDF4ED6-B1ED-4B05-B6D9-5013A963E513" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n30s1dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B63F3049-B9F8-4043-9D19-E6D4BC0263C4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n30s1dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9A1C7CF-130B-4BFA-B2E1-00BC5D3B0D14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n30s1dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C3C6462-D908-4244-8825-5EE058149C19" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n30s1dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82EC7C33-D120-474E-9784-E3E62CA6524E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n40s1dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE21C5BA-26F1-427B-9E3E-920CBFB7FACA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n40s1dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFC3216C-31B3-4E7B-BBAE-A247A22B5603" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n40s1dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BBBFF83-EB7B-4748-B34B-E58205CB6A47" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n40s1dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE1E6561-D1FC-4B0D-9F0E-327BAE9D4411" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n40s1dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB0218DB-C8C3-4DD9-A87E-97281C0CC9BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n40s1dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2199C696-EB8D-4CB7-8A9C-0ED1C81C8CB4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n60s1dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32FDC090-97D1-4C6E-8BB5-A432D8A5875E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n60s1dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29CB010B-23A2-4EEB-BE79-06652DD33A3E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n60s1dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EAC110-82A8-42F6-B8E2-67F73D3E7C3D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n60s1dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17BC798F-5224-4062-9F1A-F9B4B98EC550" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n60s1dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68DD1772-660A-4ED4-B8D8-BC930B53D6EA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n60s1dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BAA6CDB-C9D7-438B-9E94-B38A073DAA6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n30sdr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C6BA5BE-06DF-4D56-993B-36C23E9B4CED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n30sdr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74558722-D4FD-4C3C-BA93-7E1A2EBC58AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n30sdt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E295298F-8DA1-4898-BDE7-1821AABAE76E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n30sdt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF095DBD-53F2-4D59-A306-2F1DA94E520E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n30sdt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "664FFDCD-4D41-47BA-9888-0ED046024E80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n30sdt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A44F858-66EB-4518-9FD2-D9E2CA9B9B01" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n40sdr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0FAAE20-ACC7-4324-8F13-625D27DCCBF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n40sdr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C57C11B9-CC91-48BB-A8B8-B07144D05838" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n40sdt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "597C3FCA-7C5E-428F-A8FE-8038125D3457" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n40sdt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B542D580-4A98-4612-BAB1-E2E1E5F6E8E4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n40sdt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3046D1D7-5B40-4924-BE3B-9D21FFB22785" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n40sdt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FA1EB2E-66FE-478D-A9F9-E27FDBC44507" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n60sdr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E78C4A4-D859-4095-8670-717ECE0B92D0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n60sdr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B479D0B-4424-41DF-B1E7-0B7A7D8BA394" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n60sdt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9746F4F7-550F-4407-8A52-E4D233F36346" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n60sdt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A36A055E-5043-4F79-BE1B-49268CCF3BA4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n60sdt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB9327BB-DF7B-4123-B191-71AD01DBBFF5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n60sdt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FB2170F-C48E-4CD0-BA51-58BDD65EF5A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n14dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18109834-EDFB-4744-A249-C38A2836AC1C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n14dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84229CC6-74AD-4567-B7B7-8DCDFEE9FFF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n14dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AEAF6917-6FEB-4504-BC2C-5E5B4DBD3618" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n14dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8B52307-D65A-493A-AD64-83703CE0ED06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n14dt1-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4CC23CD-E90B-4A2C-B93E-27FFB8D395E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n14dt1-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D6B61DD-9071-49F1-B6C8-18BC3FD0187D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n14dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C7ACCE7-D885-45A7-9B84-4197E4DAC730" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n14dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3837AAD-8D1D-4784-B171-209B5506AA13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n14dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D74A6B20-741F-44EA-A80C-E5D89557EFCF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n14dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4602356-A871-46CE-B528-F18361AF14C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n14dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "556B05AA-7CF6-4FA7-978D-91B3AB77B9B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n14dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9758B8E-F051-4DF0-90E6-6024BFBB2691" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n20dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7651B84E-9936-414D-8DE4-16B1B07FC4FD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n20dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8F192D5F-C42E-43EF-A9CD-14B125482D36" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n20dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4096CDE-EE21-43BC-9D39-AB71FB5FA45C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n20dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D286087-6084-47AE-A0AA-B71DDB59E221" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n20dt1-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05C6A54D-3561-4CC5-AB9D-81290E171A6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n20dt1-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3612FEB-ED92-494B-B494-FC174FEEE86C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n20dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "101A5DD8-1B82-40B8-8703-F7791D20A17B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n20dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "581E884F-5B35-46BE-8E05-3F6308A092BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n20dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1203A0C3-5C7D-41D8-83E9-E70BDD21F280" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n20dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBF2672D-6B27-4238-86F7-C06F695D34CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n20dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F22EB105-751E-4766-B18F-627105991FF2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n20dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94A9A896-5943-49CC-891F-C3BC5DDEFAD6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n30dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12765028-D344-42DF-A8A5-C8D2E5881EB3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n30dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9AF55C4-329A-4996-A0AF-AF96EFCAD6E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n30dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D066E3EF-C01D-4317-951C-BF647B512448" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n30dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB54D410-BE37-4260-9D04-407A99316896" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n30dt1-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56907A58-9418-43FD-8E4F-2EADB29A3383" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n30dt1-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFE410ED-1DAC-49F1-A483-FC9C5539CD7D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n30dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4749DD1-7A29-47A2-B7B6-D2D31EE2F52B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n30dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9AF00D3-B325-4F63-932A-C84D64C5DF41" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n30dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EF99370-9A04-4FBF-82BB-52E13B7E9183" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n30dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8DD5689-23B4-4DF4-9122-4E732397319C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n30dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C68047C7-69B3-471A-9530-2914721A929A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n30dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D79AB23-394E-4A88-BD15-9970236DB27E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n40dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89492256-F35B-4F3E-A503-8C439372EB4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n40dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "278E070D-1BD1-4126-91DD-9E159520C80E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n40dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF4D3862-5F23-4AB7-8410-0BD9C701A411" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n40dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02F2CB3B-3A28-45E7-ADED-11552B07130A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n40dt1-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F78919AD-D268-4CD9-A2FD-2557AE535491" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n40dt1-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B08A698-F527-4240-A051-E380CCBA3447" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n40dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C803EDBF-E3F8-4B02-930A-9C83477CC7ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n40dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9A9E222-0666-4DC8-B5B0-992879F0A2EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n40dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61E3BCC4-38B6-49FF-89DD-DEF00A48250D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n40dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B87EC1F6-AFC8-4B51-90F7-A467E4A5B883" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n40dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB62D1F6-C067-42C4-B46A-0C5473F291DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n40dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4473ED6A-E733-41AA-BDDC-E2CDCE712685" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n60dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F02114AC-F280-4396-8B46-6481E447CE03" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n60dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B65F0D-16AA-4381-BA33-EA2710738E6B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n60dt-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8418B14B-6727-4C43-BDC5-B33C0F088F85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n60dt-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4FDF765-C99E-43B1-86BB-1937B08AB1E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n60dt1-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "30E93D67-2F6A-468B-863C-47F8D8BB6C42" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n60dt1-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "746E1177-E8FB-4536-8B08-A7FFA1CECEE0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n60dr-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "203B19E7-E8F2-485D-8291-12D5F3CA91EE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n60dr-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B550170-FF17-4840-9D3C-DC1DF76A32F5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n60dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBF0BE5E-A2DA-4E2C-8E01-BF16CADFD56A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n60dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE69CEFE-5196-49D6-9427-C5EDA99073D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-n60dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9F457B6-2DB5-4995-A6AD-D00C45B2717C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-n60dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A250F53-3777-41A1-A3A9-8C2F015C42DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-na20dr-a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D4B2867-9DD9-445C-A491-6B0E82005658" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-na20dr-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "584C53F3-8C61-4E37-BA40-8A43C3A7898B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-na20dt-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78FBF799-4995-4593-9628-57B099CF0B9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-na20dt-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5542A4DD-9AC0-4A3C-9914-AE14A3A4BA56" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:cp1e-na20dt1-d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8641B6E-7684-49EE-9882-BB53728C794F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:cp1e-na20dt1-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "178C0FFF-F58F-448D-B7B6-B6935570941E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-1500_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C706F50-BBE3-423A-93B0-BEC924151841" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-1500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD281699-D123-4301-9EDF-4BE249E24FF8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-1400_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FE3926D-E009-4796-B6BB-93A15FA2AE6E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-1400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E25F4D25-6ED0-41DD-B202-98F75FA092CD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-1300_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03624D27-28F4-4A08-92DD-8F42D8DA0CE5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-1300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2917E7F0-DAA8-4D3B-A5E4-FB0ACAEF02C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj-pa3001_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CE4A54-6674-4DD4-B64A-3A52791122FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj-pa3001:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97E4422C-0758-4A41-B3C9-FB239E3440B6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj-pd3001_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C73B153F-9FC2-4C2A-A8C7-72B33B1A82BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj-pd3001:-:*:*:*:*:*:*:*", + "matchCriteriaId": "377396A7-4CDD-4768-AA23-A0B063962CC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-r400_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB1885A2-860A-4CC8-ACC2-EE423AEC5671" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-r400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A453709-E9EE-4DD8-8638-04752B9DFB0C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-r420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B8F5979-EC57-44FE-8065-463F3D70F31D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-r420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C264C95F-F8CE-4EC1-B5A5-71998F0A75C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-r300_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D4E40AD-2699-4DCE-A9A1-04269943234D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-r300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A4809E-770F-4D7B-A532-37160D8A3943" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-r320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "125A83C8-2F88-4378-B7A3-587325414331" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-r320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32E135F9-CB75-49AF-B7C3-25E8EA3AB991" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-r520_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12808A9F-BFCA-44BC-AABF-6C725FACAEA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-r520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36BDD615-7933-4EF5-B2E5-68EB4FA776B7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-r500_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE552CFB-4EEB-4494-A10D-9A7D2A525C16" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-r500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A1BA508-3DBE-46C4-B72C-312AC3403C27" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-5300_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0899D49-A8E4-4F47-9D6F-AF0AC153D5F9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-5300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEF30DD-FCF0-499E-B5C2-4184C9A7E9D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-1520_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "869E5B56-9E7E-42D7-831C-363398194E57" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-1520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBBE1648-D428-4A43-831D-AB3AF3F05739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-1420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84B69E82-0E65-4E9C-87B0-6D09E9E957CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-1420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "148C6AE8-1480-4822-8E0B-1E8575246878" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-1320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5369A7A-138F-4AED-A306-E028ECB40835" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-1320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69D21068-A51D-48B2-BF17-68BC61737EBC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj101-1020_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "814DD377-419C-411C-9707-1E00034DF971" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj101-1020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A75CF5D-0ADE-448E-BF3C-8E2C268EE1BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj101-9020_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FD3187-956A-401E-8631-31640B99E7C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj101-9020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8696CE8A-C041-4EED-888B-36F2E499E67A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-1340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20BB703A-A30E-4E0D-8077-2798C9043B8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-1340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B381AE4-A769-403A-97FA-14FA5F8122CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-4400_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6680E32-3E99-442A-A24F-00E64A86E03A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-4400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D53224A-F4AE-42D5-9CE6-C46892BD658D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-4300_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A45A8827-FD3F-4744-AD10-A3CF9A57E4A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-4300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB77802D-96CB-49DB-A912-9DB901130F08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-4500_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0344D428-1441-4045-9E57-147E6E19B3DE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-4500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E8F99DC-4992-4141-AD76-B8A0A690AD4D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-4310_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13F6001C-1DF1-495C-9476-DD1FB58A7FCD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-4310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FDF3ECD-A475-44D1-BF08-B1D60F33D163" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj501-4320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A94700F8-1F50-48DB-9B25-81AB2893B46F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj501-4320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "060083B0-E9E5-4694-94AB-3517B4B6E0C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj301-1200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E67FA37-4D9C-4C34-81C8-E9224870E038" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj301-1200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D279907-5CF4-416F-BE78-300FD52B5B2D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj301-1100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D29BBE27-C7CB-4BCF-A051-996207A88270" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj301-1100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D92B425-000A-4A85-820E-E16B8AFF06B8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj101-1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C09A5BC1-9F63-47BC-882F-AA50D39098A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj101-1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E5A77DA0-B22A-4C26-8E64-6F272CD420A3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nj101-9000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6956B4D0-10E4-48C9-8DA5-11695E20F24A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nj101-9000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3883A8C-C4EC-45F0-B164-0BADFF91E361" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nx1p2-1140dt_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D09D212A-C7AD-443C-9A4F-A578BD86B3EA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nx1p2-1140dt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFF59B0A-C08C-4D56-B301-631DD155BEF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nx1p2-1140dt1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "968A2C5C-47A9-44E2-92D6-C18BC226865C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nx1p2-1140dt1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63EEFB13-8B20-4A42-8511-98C4C8E045FA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nx1p2-1040dt_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E005C42-0DDB-44B1-8F4B-119A221229C9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nx1p2-1040dt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7EF898A-8273-4044-8F4B-B2082294749F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nx1p2-1040dt1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DCCE473-483F-4D85-8FC8-D56BC1941A66" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nx1p2-1040dt1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8DD457B-3E36-4C10-B34F-21CD0B931459" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nx1p2-9024dt_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA591A06-35E2-4AAA-AB50-1353F07C83CC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nx1p2-9024dt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B1E7DBC-6211-4503-9154-D0BD0FA3BE95" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nx1p2-9024dt1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "134908A7-4F87-449A-9DA2-0F603C054617" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nx1p2-9024dt1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F193D7DE-97C1-4883-871D-78AC7FCB9B14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nx102-1200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3216A051-4661-499B-A081-7A0A5ACD42B0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nx102-1200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8A6528B-2160-4CE4-88B2-EC69DB5797B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nx102-1100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89CCA8EF-C8E8-407A-9ED6-BE47DA81189E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nx102-1100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1E68759-07B1-4F7B-8EF8-0429C8CFCAAF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nx102-1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A59C29C9-794C-4F04-9E98-D2EBCA33B735" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nx102-1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D01F33E2-E10C-4B3F-9326-7022924423DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nx102-9000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9A6C496-EA29-4A51-89B4-183BA832B4CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nx102-9000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A9DDB7B-213B-41F3-ABC0-23A4834C3449" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nx102-1220_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F34C812B-4D3E-49FD-AF1E-12BA3130DA4B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nx102-1220:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE463BB1-BE67-4D80-8FE7-85F960945AF5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nx102-1120_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6CA52D2-983A-4A5A-BE0F-BE90B7DA3554" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nx102-1120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E72347A8-8725-4DAB-9D2C-609072A4E904" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nx102-1020_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A32E012-605D-4A8C-86BA-9BF7EBA808FD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nx102-1020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1A91E22-8F08-4470-BC4A-14D25A827607" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nx102-9020_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13DB9CD1-613D-417F-8F76-0EB87E16E39E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nx102-9020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34CE73C8-BF67-4BC3-81B2-275393441C91" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nx701-1720_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.16", + "matchCriteriaId": "44436716-0143-4D3C-97AB-16D3362C41D4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nx701-1720:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2434BE7E-3E5D-48A9-838C-BCC6055135F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:omron:nx701-1620_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.16", + "matchCriteriaId": "128E5C07-A0A3-45A4-B7FD-E3AEF657173E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:omron:nx701-1620:-:*:*:*:*:*:*:*", + "matchCriteriaId": "210D7FA7-18A3-45B7-976B-9DEDC59294C7" + } + ] + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/ta/JVNTA91513661/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://jvn.jp/ta/JVNTA91513661/", - "source": "vultures@jpcert.or.jp" - }, - { - "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-02", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.fa.omron.co.jp/product/vulnerability/OMSR-2023-003_ja.pdf", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ia.omron.com/product/vulnerability/OMSR-2023-003_en.pdf", - "source": "vultures@jpcert.or.jp" - }, - { - "url": "https://www.us-cert.gov/ics/advisories/icsa-19-346-02", - "source": "vultures@jpcert.or.jp" - }, - { - "url": "https://www.us-cert.gov/ics/advisories/icsa-20-063-03", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2711.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2711.json index 1a9c5319eb6..736aacab53e 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2711.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2711.json @@ -2,15 +2,38 @@ "id": "CVE-2023-2711", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:11.267", - "lastModified": "2023-06-27T16:15:35.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:36:44.303", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Ultimate Product Catalog WordPress plugin before 5.2.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:etoilewebdesign:ultimate_product_catalog:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.2.6", + "matchCriteriaId": "5CFF58EB-F9E0-448C-9AA8-20083AB64521" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/71c5b5b5-8694-4738-8e4b-8670a8d21c86", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2743.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2743.json index 8e0190dfa4f..78fe892e10c 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2743.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2743.json @@ -2,15 +2,38 @@ "id": "CVE-2023-2743", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:11.373", - "lastModified": "2023-06-27T16:15:35.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:40:00.627", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The ERP WordPress plugin before 1.12.4 does not sanitise and escape the employee_name parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.12.4", + "matchCriteriaId": "BE3A5587-B779-4B9A-9606-78A0DE115618" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/517c6aa4-a56d-4f13-b370-7c864dd9c7db", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2744.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2744.json index 524970e4046..fb2353fa675 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2744.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2744.json @@ -2,15 +2,38 @@ "id": "CVE-2023-2744", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:11.433", - "lastModified": "2023-06-27T16:15:35.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:41:02.260", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The ERP WordPress plugin before 1.12.4 does not properly sanitise and escape the `type` parameter in the `erp/v1/accounting/v1/people` REST API endpoint before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.12.4", + "matchCriteriaId": "BE3A5587-B779-4B9A-9606-78A0DE115618" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/435da8a1-9955-46d7-a508-b5738259e731", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28799.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28799.json index 473151f4c53..7d7058a7b06 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28799.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28799.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28799", "sourceIdentifier": "cve@zscaler.com", "published": "2023-06-22T20:15:09.283", - "lastModified": "2023-06-23T13:03:39.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:15:59.797", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve@zscaler.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + }, { "source": "cve@zscaler.com", "type": "Secondary", @@ -46,30 +76,96 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "1.4", + "matchCriteriaId": "904F4E73-6782-4AD8-8521-FEB473BF11CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "1.9.3", + "matchCriteriaId": "8580E274-19E5-454B-9FA4-F79D6E67C244" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:chrome_os:*:*", + "versionEndExcluding": "1.10.1", + "matchCriteriaId": "1A4B24E4-D317-4D64-8BBC-EF86290F812C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:android:*:*", + "versionEndExcluding": "1.10.2", + "matchCriteriaId": "753A378D-ECC2-4CBD-B142-58F413AF5497" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "3.7", + "matchCriteriaId": "B549DC33-2238-4356-8079-A7D18323255E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "3.9", + "matchCriteriaId": "A2D8B3BE-B451-4596-8FDB-BD43BC2BB923" + } + ] + } + ] + } + ], "references": [ { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux&applicable_version=1.4&deployment_date=2022-10-31&id=1420246", - "source": "cve@zscaler.com" + "source": "cve@zscaler.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Android&applicable_version=1.10.2&deployment_date=2023-03-09&id=1447706", - "source": "cve@zscaler.com" + "source": "cve@zscaler.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Chrome%20OS&applicable_version=1.10.1&deployment_date=2023-03-10&id=1447771", - "source": "cve@zscaler.com" + "source": "cve@zscaler.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=iOS&applicable_version=1.9.3&deployment_date=2023-03-03&id=1447071", - "source": "cve@zscaler.com" + "source": "cve@zscaler.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macOS&applicable_version=3.9&deployment_date=2023-01-25&id=1443546", - "source": "cve@zscaler.com" + "source": "cve@zscaler.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=Windows&applicable_version=3.7&deployment_date=2021-11-26&id=1386541", - "source": "cve@zscaler.com" + "source": "cve@zscaler.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28810.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28810.json index ff2291afc9d..c79c392881a 100644 --- a/CVE-2023/CVE-2023-288xx/CVE-2023-28810.json +++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28810.json @@ -2,16 +2,40 @@ "id": "CVE-2023-28810", "sourceIdentifier": "hsrc@hikvision.com", "published": "2023-06-15T22:15:09.307", - "lastModified": "2023-06-16T03:19:08.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:39:21.073", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Some access control/intercom products have unauthorized modification of device network configuration vulnerabilities. Attackers can modify device network configuration by sending specific data packets to the vulnerable interface within the same local network." + }, + { + "lang": "es", + "value": "Algunos productos de control de acceso/intercomunicaci\u00f3n tienen vulnerabilidades de modificaci\u00f3n no autorizada de la configuraci\u00f3n de red del dispositivo. Los atacantes pueden modificar la configuraci\u00f3n de red del dispositivo enviando paquetes de datos espec\u00edficos a la interfaz vulnerable dentro de la misma red local." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "hsrc@hikvision.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "hsrc@hikvision.com", "type": "Secondary", @@ -46,10 +80,1051 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t804af_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.4.0_build221212", + "matchCriteriaId": "1E7210D6-59F8-4CF5-BC91-7B9C3977A931" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t804af:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF2888DD-2FBC-453F-ADED-2134D526EB7A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t804amf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.4.0_build221212", + "matchCriteriaId": "019EB9DA-0EAF-46B1-8742-88E3028D1692" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t804amf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81F0BEA6-D675-4B8D-AEE3-44A63C7107D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t341am_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.2.30_build221223", + "matchCriteriaId": "FBBBEA5D-4FC4-4467-8A0A-2E8107CFACCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t341am:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F12C75F-FEA4-478D-968A-9B864C49CBFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t341amf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.2.30_build221223", + "matchCriteriaId": "257A0265-4E4B-40D6-B87A-1D8EC0124DEB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t341amf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85E8A304-F67E-4C0E-995B-719E9AFD2791" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t671m_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.2.30_build221223", + "matchCriteriaId": "08E585F0-D8E7-4598-AFE5-BC0CB9EFB9E9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t671m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4902A1D4-7DF1-4718-BF06-DD6E7EE43E8E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t671mf_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.2.30_build221223", + "matchCriteriaId": "E62ABCED-5070-48B1-B119-65AF3F6C53D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t671mf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFBF47B3-0575-47C7-81E6-43E52411EA4D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t671_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.2.30_build221223", + "matchCriteriaId": "F5CBDD8B-47DC-4FA5-90ED-19C0186D713C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t671:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B322AE4-4BE3-46EE-BFFD-730274270D52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t343efwx_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.14.0_build230117", + "matchCriteriaId": "2D959680-AF43-4DFD-BE8E-2843C7C9258E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t343efwx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC5E355A-26E3-4B3F-93D4-D0707DDB8575" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t343efx_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.14.0_build230117", + "matchCriteriaId": "7558BAD9-B424-4936-ACCB-CF3DA8CFB4CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t343efx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AEF8C27-3005-4742-AAA9-4E55CFBAB742" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t343ewx_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.14.0_build230117", + "matchCriteriaId": "7C1A8E0F-503D-4539-B97E-29C805E31480" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t343ewx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98F2425-FCB9-40DE-BCE0-3CA9BA6067BF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t343ex_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.14.0_build230117", + "matchCriteriaId": "63B1245C-68DA-4240-9484-E4941E71FFCC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t343ex:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EB3496-4191-4092-961C-5F68D7A99EF6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t343mfwx_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.14.0_build230117", + "matchCriteriaId": "01D8846F-BE2B-4E4D-A829-46C4AD6020C9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t343mfwx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC08767C-8FE0-4DD3-9B9D-9F2D2AC5E83C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t343mfx_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.14.0_build230117", + "matchCriteriaId": "1866075D-7885-4AD4-8558-5A22DD67FF3E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t343mfx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F42F5837-D22D-4F28-B8D0-9682645DD67A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t343mwx_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.14.0_build230117", + "matchCriteriaId": "9ECF8ED3-8398-4EEB-B6CC-A892BD576272" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t343mwx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7416B8F5-2918-4418-8A5C-860C5A236BCA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t343mx_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.14.0_build230117", + "matchCriteriaId": "BF8CA123-2135-43E1-9FF6-B6A5C97C30F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t343mx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D4D8C07-AB2F-4E97-B3E9-C97EFAD3F017" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t341c_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.3.8_build230112", + "matchCriteriaId": "D4B1E3D8-EFD5-411A-83D7-6C907CD4CF9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t341c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "592F9F35-4C09-4EF2-BA57-D0A2A1DD9CAD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t320efwx_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.5.0_build220706", + "matchCriteriaId": "528E346B-8161-4AF1-B167-D25F5008D94A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t320efwx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7140EB24-E7B5-4F86-9A5C-0D88D1DA90C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t320efx_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.5.0_build220706", + "matchCriteriaId": "05AE08A9-1D1F-4092-945C-EEE078A78341" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t320efx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21D67B36-A2A7-42E2-A7FB-6BBF3A973E37" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t320ewx_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.5.0_build220706", + "matchCriteriaId": "5A6CA668-9927-4BDA-9009-2EA585FAF29A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t320ewx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4694AEF-26C6-4B03-BCCB-3683CF788085" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t320ex_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.5.0_build220706", + "matchCriteriaId": "A7E740DF-1CDE-45B5-9FCF-EEF360035FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t320ex:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4C45E6F-34DD-4B08-A87F-D9E7D9775ED1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t320mfwx_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.5.0_build220706", + "matchCriteriaId": "F3C2641D-32C0-4C73-B2DE-83DE5E7F97A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t320mfwx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC9B3F47-00F9-4C77-AFAF-25D6154E4C15" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t320mfx_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.5.0_build220706", + "matchCriteriaId": "E7844E10-FD2C-4461-8099-74C340B210A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t320mfx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C842855-FD06-412E-9B88-EDC8B419E87F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t320mwx_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.5.0_build220706", + "matchCriteriaId": "3BE24A1E-F108-42CE-981E-818005D97B6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t320mwx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "541C2F9D-E8D1-4928-B3DE-902B51B33A56" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-k1t320mx_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.5.0_build220706", + "matchCriteriaId": "3AC68DB9-679F-47D1-931C-23CD3F78FF63" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-k1t320mx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39668BE9-C9D5-4747-A7EA-EC3C9ADC64B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-kh6320-wte1_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.2.8_build230219", + "matchCriteriaId": "B8A1024B-CBF1-483D-8A66-71D2FFFC754E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-kh6320-wte1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97264003-9B83-444C-ADEF-5F0E61C96618" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-kh6350-wte1_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.2.8_build230219", + "matchCriteriaId": "F4D22F33-1568-41FC-A7E6-811B82DB524E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-kh6350-wte1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9562CB3D-9491-407C-9A59-0F0C48D724BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-kh6351-te1_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.2.8_build230219", + "matchCriteriaId": "CD101A62-A6DA-4FC0-9351-0B9EF4BB19DC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-kh6351-te1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA19A366-0EE7-45D2-A3B2-4EE397FBA95A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-kh6351-wte1_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.2.8_build230219", + "matchCriteriaId": "20510B6F-E6F5-4B59-A26D-5B561009C37C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-kh6351-wte1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B61ABFF8-5AD3-4367-AA3E-E36DCD93ABE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-kh6320-le1_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.2.8_build230219", + "matchCriteriaId": "D4C0ACB7-BF57-487B-8A17-3CD945D1352C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-kh6320-le1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4DAC9C0-6A97-4AA2-9FBE-58E5E1D11666" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-kh63le1\\(b\\)_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.2.8_build230219", + "matchCriteriaId": "A935D87A-6AE5-4EA8-9A84-CC27629990C8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-kh63le1\\(b\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B1FDC90-73BA-4691-B942-AE30CA342C9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-kh6320-tde1_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.2.8_build230219", + "matchCriteriaId": "C890DF8E-4CFD-423F-8B12-77807BAF224F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-kh6320-tde1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3BC79E9F-0971-46B0-B0AB-062AB4653345" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-kh6320-te1_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.2.8_build230219", + "matchCriteriaId": "EBAA099A-3745-4472-BF48-09FC80628777" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-kh6320-te1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BD7D924-84B8-4253-995C-A1E74B3C329C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-kh6320-wtde1_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.2.8_build230219", + "matchCriteriaId": "0A244A2C-4A12-40A5-8D82-666B78008564" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-kh6320-wtde1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF4C1CB8-96D8-4E28-B85A-29D05BE4C272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-kh8520-wte1_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.2.8_build230219", + "matchCriteriaId": "32F4E80D-1588-415B-8FCB-841BFD65B2C4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-kh8520-wte1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97280A4A-0EFE-418C-9E94-92239E463163" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-kh6220-le1_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.4.62_build220414", + "matchCriteriaId": "6962A31E-147F-4FC8-A521-7E7BE0FBAA9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-kh6220-le1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "547F6609-4304-4CB8-A07A-2C3D2E7241E8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-kh9310-wte1\\(b\\)_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.1.76_build230204", + "matchCriteriaId": "E523912D-ADF6-44C0-96C9-20096648D43A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-kh9310-wte1\\(b\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3244947-9255-48E0-9491-CD2DFBF21943" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hikvision:ds-kh9510-wte1\\(b\\)_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.1.76_build230204", + "matchCriteriaId": "977960FF-4E40-4F30-93E2-025226F20645" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hikvision:ds-kh9510-wte1\\(b\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "62E1B212-E667-4FC0-AF02-116F58D917F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-access-control-intercom/", - "source": "hsrc@hikvision.com" + "source": "hsrc@hikvision.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29709.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29709.json index f60e6ea7bd1..2fa63047a7f 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29709.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29709.json @@ -2,23 +2,94 @@ "id": "CVE-2023-29709", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-22T11:15:09.437", - "lastModified": "2023-06-22T12:51:23.447", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:33:44.100", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in /cgi-bin/login_rj.cgi in Wildix WSG24POE version 103SP7D190822, allows attackers to bypass authentication." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wildix:wsg24poe_firmware:103sp7d190822:*:*:*:*:*:*:*", + "matchCriteriaId": "331CF3D2-88D6-4964-9345-6281FA11A663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wildix:wsg24poe:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A64F75D-4758-4150-A82D-EB8A463F0667" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/shellpei/Wildix-Logical/blob/main/CVE-2023-29709", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://holistic-height-e6d.notion.site/Wildix-WSG24POE-Logical-vulnerability-7780c24cc25b40dd9d2830f7b21f04a3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29860.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29860.json index cbccfd84656..e546021c19e 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29860.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29860.json @@ -2,19 +2,76 @@ "id": "CVE-2023-29860", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-23T12:15:09.420", - "lastModified": "2023-06-23T13:03:18.900", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:43:02.477", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An insecure permissions in /Taier/API/tenant/listTenant interface in DTStack Taier 1.3.0 allows attackers to view sensitive information via the getCookie method." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dtstack:taier:1.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "57272DA3-20D3-4F6A-9448-1EF30C48057F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DTStack/Taier/issues/1003", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3128.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3128.json index ad9a4043689..57ac8448567 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3128.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3128.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3128", "sourceIdentifier": "security@grafana.com", "published": "2023-06-22T21:15:09.573", - "lastModified": "2023-06-23T13:03:39.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:49:02.207", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security@grafana.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + }, { "source": "security@grafana.com", "type": "Secondary", @@ -46,10 +76,95 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*", + "versionStartIncluding": "6.7.0", + "versionEndExcluding": "8.5.27", + "matchCriteriaId": "83E4CB78-7F97-4B9A-B644-ED98761C6213" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "6.7.0", + "versionEndExcluding": "8.5.27", + "matchCriteriaId": "26C597A7-F2D1-4A33-BBBD-352669DB8E91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*", + "versionStartIncluding": "9.2.0", + "versionEndExcluding": "9.2.20", + "matchCriteriaId": "C47AA0E0-72E8-4235-8D27-7F579929D179" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.2.0", + "versionEndExcluding": "9.2.20", + "matchCriteriaId": "F825B098-EEA7-415F-A9EA-6E72D741E614" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*", + "versionStartIncluding": "9.3.0", + "versionEndExcluding": "9.3.16", + "matchCriteriaId": "4F05305B-94D2-4687-8AE9-F55CE840B647" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.3.0", + "versionEndExcluding": "9.3.16", + "matchCriteriaId": "C32F2F70-18A1-47D6-8B5E-F20D096AEBD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*", + "versionStartIncluding": "9.4.0", + "versionEndExcluding": "9.4.13", + "matchCriteriaId": "C40FF772-6C54-4B5C-BD5C-560E192B79F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.4.0", + "versionEndExcluding": "9.4.13", + "matchCriteriaId": "61DA1D1A-D969-492E-9A43-A99E9A918A5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*", + "versionStartIncluding": "9.5.0", + "versionEndExcluding": "9.5.4", + "matchCriteriaId": "B08F1010-C1F8-4F29-A65D-D9A741F77AA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "9.5.0", + "versionEndExcluding": "9.5.4", + "matchCriteriaId": "E61B4ECF-7DC6-4487-9F27-8660BD8AD179" + } + ] + } + ] + } + ], "references": [ { "url": "https://grafana.com/security/security-advisories/cve-2023-3128/", - "source": "security@grafana.com" + "source": "security@grafana.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32320.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32320.json index 7b99a0f779b..d51682ab136 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32320.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32320.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32320", "sourceIdentifier": "security-advisories@github.com", "published": "2023-06-22T21:15:09.287", - "lastModified": "2023-06-23T13:03:39.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:49:57.387", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,18 +66,96 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "21.0.0", + "versionEndExcluding": "21.0.9.12", + "matchCriteriaId": "C3851B67-74A7-4D1D-8B7C-F5A0075B2700" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "22.0.0", + "versionEndExcluding": "22.2.10.12", + "matchCriteriaId": "C5FA775A-1796-4C82-B943-CEC91FDA6A00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "23.0.0", + "versionEndExcluding": "23.0.12.7", + "matchCriteriaId": "57E82EBA-930D-4B32-B2B5-3B7119C2EF8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.0.12.2", + "matchCriteriaId": "9603AC3F-5104-4C18-BF51-25B52BC7E146" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*", + "versionStartIncluding": "25.0.0", + "versionEndExcluding": "25.0.7", + "matchCriteriaId": "DD58A3B6-945E-4AFC-AE5C-A374C884167B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "25.0.0", + "versionEndExcluding": "25.0.7", + "matchCriteriaId": "7AC695D0-BD79-42B5-BA1D-3356791E4DEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*", + "versionStartIncluding": "26.0.0", + "versionEndExcluding": "26.0.2", + "matchCriteriaId": "CB3473C7-E5B9-44B1-AC74-F7224D9AB78B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "26.0.0", + "versionEndExcluding": "26.0.2", + "matchCriteriaId": "AE95CF9F-D964-4857-8805-2CE4CF2F6328" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qphh-6xh7-vffg", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/nextcloud/server/pull/38274", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://hackerone.com/reports/1918525", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32521.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32521.json index e4fa11c23f4..5777adf38b3 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32521.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32521.json @@ -2,23 +2,83 @@ "id": "CVE-2023-32521", "sourceIdentifier": "security@trendmicro.com", "published": "2023-06-26T22:15:10.017", - "lastModified": "2023-06-26T22:22:38.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:48:47.217", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A path traversal exists in a specific service dll of Trend Micro Mobile Security (Enterprise) 9.8 SP5 which could allow an unauthenticated remote attacker to delete arbitrary files." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:mobile_security:9.8:sp5:*:*:enterprise:windows:*:*", + "matchCriteriaId": "B72F17DB-148B-4426-968C-F7CF94DAF717" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://www.tenable.com/security/research/tra-2023-17", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32522.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32522.json index bb45f5be075..dcefc137510 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32522.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32522.json @@ -2,23 +2,83 @@ "id": "CVE-2023-32522", "sourceIdentifier": "security@trendmicro.com", "published": "2023-06-26T22:15:10.057", - "lastModified": "2023-06-26T22:22:38.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:10:43.140", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A path traversal exists in a specific dll of Trend Micro Mobile Security (Enterprise) 9.8 SP5 which could allow an authenticated remote attacker to delete arbitrary files.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:mobile_security:9.8:sp5:*:*:enterprise:windows:*:*", + "matchCriteriaId": "B72F17DB-148B-4426-968C-F7CF94DAF717" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://www.tenable.com/security/research/tra-2023-17", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32557.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32557.json index 09a7e882f71..49a9856a663 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32557.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32557.json @@ -2,19 +2,93 @@ "id": "CVE-2023-32557", "sourceIdentifier": "security@trendmicro.com", "published": "2023-06-26T22:15:10.977", - "lastModified": "2023-06-26T22:22:30.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T18:00:02.733", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability in the Trend Micro Apex One and Apex One as a Service could allow an unauthenticated attacker to upload an arbitrary file to the Management Server which could lead to remote code execution with system privileges." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:*:*:*", + "versionEndExcluding": "14.0.12105", + "matchCriteriaId": "2BEB6165-97A6-4EE9-B7D8-66D62469AE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "AF019D2D-C426-4D2D-A254-442CE777B41E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293108?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32604.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32604.json index afce6710c59..a3c2b45fe48 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32604.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32604.json @@ -2,19 +2,75 @@ "id": "CVE-2023-32604", "sourceIdentifier": "security@trendmicro.com", "published": "2023-06-26T22:15:11.020", - "lastModified": "2023-06-26T22:22:30.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:59:30.717", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. \r\n\r\nPlease note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.\r\n\r\nThis is similar to, but not identical to CVE-2023-32605." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_central:2019:-:*:*:*:windows:*:*", + "matchCriteriaId": "7F2620DA-8727-43FF-8A4D-72145CDDE4CD" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32605.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32605.json index 2d334f76920..dae56f1ac96 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32605.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32605.json @@ -2,19 +2,75 @@ "id": "CVE-2023-32605", "sourceIdentifier": "security@trendmicro.com", "published": "2023-06-26T22:15:11.063", - "lastModified": "2023-06-26T22:22:30.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:59:17.467", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. \r\n\r\nPlease note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.\r\n\r\nThis is similar to, but not identical to CVE-2023-32604." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_central:2019:-:*:*:*:windows:*:*", + "matchCriteriaId": "7F2620DA-8727-43FF-8A4D-72145CDDE4CD" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293107?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-327xx/CVE-2023-32753.json b/CVE-2023/CVE-2023-327xx/CVE-2023-32753.json index e361d9daa9f..1ce4db89bfa 100644 --- a/CVE-2023/CVE-2023-327xx/CVE-2023-32753.json +++ b/CVE-2023/CVE-2023-327xx/CVE-2023-32753.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32753", "sourceIdentifier": "twcert@cert.org.tw", "published": "2023-06-16T04:15:13.863", - "lastModified": "2023-06-16T12:47:18.707", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:38:30.680", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:itpison:omicard_edm:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAD5717D-1285-494C-8C34-54ACFF4A6EA1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.twcert.org.tw/en/cp-139-7190-d73c1-2.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33141.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33141.json index 6b4bccd0c11..7ab5be22268 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33141.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33141.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33141", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-23T02:15:09.513", - "lastModified": "2023-06-23T13:03:31.027", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:35:43.033", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:yet_another_reverse_proxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "1.1.2", + "matchCriteriaId": "4BE2C6E7-6DF4-47EC-8B54-95CA34F089E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:yet_another_reverse_proxy:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "AA8B5638-5F72-4D24-BBC1-C2F419B89C49" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33141", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3326.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3326.json index e7c63f8d521..af3e051c9c3 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3326.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3326.json @@ -2,16 +2,49 @@ "id": "CVE-2023-3326", "sourceIdentifier": "secteam@freebsd.org", "published": "2023-06-22T17:15:44.833", - "lastModified": "2023-06-22T20:05:36.757", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:31:33.127", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "pam_krb5 authenticates a user by essentially running kinit with the password, getting a ticket-granting ticket (tgt) from the Kerberos KDC (Key Distribution Center) over the network, as a way to verify the password. However, if a keytab is not provisioned on the system, pam_krb5 has no way to validate the response from the KDC, and essentially trusts the tgt provided over the network as being valid. In a non-default FreeBSD installation that leverages pam_krb5 for authentication and does not have a keytab provisioned, an attacker that is able to control both the password and the KDC responses can return a valid tgt, allowing authentication to occur for any user on the system.\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, { "source": "secteam@freebsd.org", "type": "Secondary", @@ -23,10 +56,124 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.4", + "matchCriteriaId": "A7F6C8B0-9D75-476C-ADBA-754416FBC186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.1", + "matchCriteriaId": "D79AAEBE-0D5A-4C9C-95FD-6287A53EE1C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:12.4:-:*:*:*:*:*:*", + "matchCriteriaId": "24920B4D-96C0-401F-B679-BEB086760EAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:12.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "3CE32730-A9F5-4E8D-BDA4-6B8232F84787" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:12.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "552E81DE-D409-475F-8ED0-E10A0BE43D29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:12.4:rc2-p1:*:*:*:*:*:*", + "matchCriteriaId": "BA821886-B26B-47A6-ABC9-B8F70CE0ACFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:12.4:rc2-p2:*:*:*:*:*:*", + "matchCriteriaId": "220629AD-32CC-4303-86AE-1DD27F0E4C65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:13.1:-:*:*:*:*:*:*", + "matchCriteriaId": "DEEE6D52-27E4-438D-AE8D-7141320B5973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:13.1:b1-p1:*:*:*:*:*:*", + "matchCriteriaId": "66364EA4-83B1-4597-8C18-D5633B361A9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:13.1:b2-p2:*:*:*:*:*:*", + "matchCriteriaId": "EF9292DD-EFB1-4B50-A941-7485D901489F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:13.1:p1:*:*:*:*:*:*", + "matchCriteriaId": "EFB18F55-4F5C-4166-9A7E-6F6617179A90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:13.1:p2:*:*:*:*:*:*", + "matchCriteriaId": "66E1C269-841F-489A-9A0A-5D145B417E0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:13.1:p3:*:*:*:*:*:*", + "matchCriteriaId": "ECF1B567-F764-45F5-A793-BEA93720F952" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:13.1:p4:*:*:*:*:*:*", + "matchCriteriaId": "DAFE3F33-2C57-4B52-B658-82572607BD8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:13.1:p5:*:*:*:*:*:*", + "matchCriteriaId": "C925DF75-2785-44BD-91CA-66D29C296689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:13.1:p6:*:*:*:*:*:*", + "matchCriteriaId": "BCE2DAEC-81A5-49E9-B7E7-4F143FA6B3F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:13.1:p7:*:*:*:*:*:*", + "matchCriteriaId": "7725D503-1437-4F90-B30C-007193D5F0E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:13.1:rc1-p1:*:*:*:*:*:*", + "matchCriteriaId": "B536EE52-ED49-4A85-BC9D-A27828D5A961" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:-:*:*:*:*:*:*", + "matchCriteriaId": "A87EFA20-DD6B-41C5-98FD-A29F67D2E732" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-23:04.pam_krb5.asc", - "source": "secteam@freebsd.org" + "source": "secteam@freebsd.org", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34144.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34144.json index a32d0d9effb..42675227a12 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34144.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34144.json @@ -2,23 +2,101 @@ "id": "CVE-2023-34144", "sourceIdentifier": "security@trendmicro.com", "published": "2023-06-26T22:15:11.107", - "lastModified": "2023-06-26T22:22:30.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:58:49.123", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate their privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\r\n\r\nThis is a similar, but not identical vulnerability as CVE-2023-34145." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:*:*:*", + "versionEndExcluding": "14.0.12518", + "matchCriteriaId": "0A9B37D4-BC67-44F0-BEA7-918A5E834C7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "AF019D2D-C426-4D2D-A254-442CE777B41E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-835/", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34145.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34145.json index 3590aeb780b..b2fc07b266a 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34145.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34145.json @@ -2,23 +2,101 @@ "id": "CVE-2023-34145", "sourceIdentifier": "security@trendmicro.com", "published": "2023-06-26T22:15:11.147", - "lastModified": "2023-06-26T22:22:30.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:58:29.067", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate their privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\r\n\r\nThis is a similar, but not identical vulnerability as CVE-2023-34144." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:*:*:*", + "versionEndExcluding": "14.0.12518", + "matchCriteriaId": "0A9B37D4-BC67-44F0-BEA7-918A5E834C7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "AF019D2D-C426-4D2D-A254-442CE777B41E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-836/", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34146.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34146.json index 91296bd9f01..17291b14703 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34146.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34146.json @@ -2,23 +2,101 @@ "id": "CVE-2023-34146", "sourceIdentifier": "security@trendmicro.com", "published": "2023-06-26T22:15:11.187", - "lastModified": "2023-06-26T22:22:30.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:58:09.347", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\r\n\r\nThis is a similar, but not identical vulnerability as CVE-2023-34147 and CVE-2023-34148." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:*:*:*", + "versionEndExcluding": "14.0.12518", + "matchCriteriaId": "0A9B37D4-BC67-44F0-BEA7-918A5E834C7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "AF019D2D-C426-4D2D-A254-442CE777B41E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-832/", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34147.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34147.json index 66218011f37..818801adcd8 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34147.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34147.json @@ -2,23 +2,101 @@ "id": "CVE-2023-34147", "sourceIdentifier": "security@trendmicro.com", "published": "2023-06-26T22:15:11.230", - "lastModified": "2023-06-26T22:22:30.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:56:50.020", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\r\n\r\nThis is a similar, but not identical vulnerability as CVE-2023-34146 and CVE-2023-34148." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:*:*:*", + "versionEndExcluding": "14.0.12518", + "matchCriteriaId": "0A9B37D4-BC67-44F0-BEA7-918A5E834C7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "AF019D2D-C426-4D2D-A254-442CE777B41E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-833/", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34148.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34148.json index 2ee0865dc4b..3529691628e 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34148.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34148.json @@ -2,23 +2,101 @@ "id": "CVE-2023-34148", "sourceIdentifier": "security@trendmicro.com", "published": "2023-06-26T22:15:11.270", - "lastModified": "2023-06-26T22:22:30.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:53:51.130", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\r\n\r\nThis is a similar, but not identical vulnerability as CVE-2023-34146 and CVE-2023-34147." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:*:*:*", + "versionEndExcluding": "14.0.12518", + "matchCriteriaId": "0A9B37D4-BC67-44F0-BEA7-918A5E834C7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "AF019D2D-C426-4D2D-A254-442CE777B41E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-834/", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34165.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34165.json index 9f0e6fe1f9c..969846b122f 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34165.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34165.json @@ -2,19 +2,74 @@ "id": "CVE-2023-34165", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-16T07:15:08.840", - "lastModified": "2023-06-16T12:47:18.707", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:38:17.647", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Unauthorized access vulnerability in the Save for later feature provided by AI Touch.Successful exploitation of this vulnerability may cause third-party apps to forge a URI for unauthorized access with zero permissions." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BCE0AFB0-A112-484B-BEAD-A7F1BDDCE313" + } + ] + } + ] + } + ], "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34462.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34462.json index f10e18f5cdc..4170115e540 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34462.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34462.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34462", "sourceIdentifier": "security-advisories@github.com", "published": "2023-06-22T23:15:09.573", - "lastModified": "2023-06-23T13:03:31.027", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:21:12.957", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,14 +76,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.1.94", + "matchCriteriaId": "81839C38-65FD-4F9E-A654-29E4FB5D047C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/netty/netty/commit/535da17e45201ae4278c0479e6162bb4127d4c32", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/netty/netty/security/advisories/GHSA-6mjq-h674-j845", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-347xx/CVE-2023-34796.json b/CVE-2023/CVE-2023-347xx/CVE-2023-34796.json index 7495dfd001a..28b55cb2b02 100644 --- a/CVE-2023/CVE-2023-347xx/CVE-2023-34796.json +++ b/CVE-2023/CVE-2023-347xx/CVE-2023-34796.json @@ -2,23 +2,83 @@ "id": "CVE-2023-34796", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-22T19:15:08.917", - "lastModified": "2023-06-22T20:05:36.757", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:30:21.087", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross site scripting (XSS) vulnerabiliy in dmarcts-report-viewer dashboard versions 1.1 and thru commit 8a1d882b4c481a05e296e9b38a7961e912146a0f, allows unauthenticated attackers to execute arbitrary code via the org_name or domain values." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:techsneeze:dmarc_report:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D5A1E182-D90D-4FA5-BC6C-B06331D4C582" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/techsneeze/dmarcts-report-viewer/pull/88", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://xmit.xyz/security/dmarcd-for-death/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-348xx/CVE-2023-34840.json b/CVE-2023/CVE-2023-348xx/CVE-2023-34840.json new file mode 100644 index 00000000000..796f551e07c --- /dev/null +++ b/CVE-2023/CVE-2023-348xx/CVE-2023-34840.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-34840", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-30T16:15:09.600", + "lastModified": "2023-06-30T16:15:09.600", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "angular-ui-notification v0.1.0, v0.2.0, and v0.3.6 was discovered to contain a cross-site scripting (XSS) vulnerability." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://alexcrack.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Xh4H/CVE-2023-34840", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/alexcrack/angular-ui-notification", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34923.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34923.json index c12c4a81891..9bdab28a2bb 100644 --- a/CVE-2023/CVE-2023-349xx/CVE-2023-34923.json +++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34923.json @@ -2,23 +2,83 @@ "id": "CVE-2023-34923", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-22T19:15:08.987", - "lastModified": "2023-06-22T20:05:36.757", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:20:02.137", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "XML Signature Wrapping (XSW) in SAML-based Single Sign-on feature in TOPdesk v12.10.12 allows bad actors with credentials to authenticate with the Identity Provider (IP) to impersonate any TOPdesk user via SAML Response manipulation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:topdesk:topdesk:12.10.12:*:*:*:*:*:*:*", + "matchCriteriaId": "0BFB9431-22FE-46C4-AC0B-F0E0ED9ABD28" + } + ] + } + ] + } + ], "references": [ { "url": "https://char49.com/articles/topdesk-vulnerable-to-xml-signature-wrapping-attacks", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://my.topdesk.com/tas/public/ssp/content/detail/knowledgeitem?unid=56a16ba1c2824e9a82655892ba75d3c0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35175.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35175.json new file mode 100644 index 00000000000..c9a89add9c1 --- /dev/null +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35175.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-35175", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2023-06-30T16:15:09.643", + "lastModified": "2023-06-30T16:15:09.643", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Certain HP LaserJet Pro print products are potentially vulnerable to Potential Remote Code Execution and/or Elevation of Privilege via Server-Side Request Forgery (SSRF) using the Web Service Eventing model." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_8651322-8651446-16/hpsbpi03851", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35176.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35176.json new file mode 100644 index 00000000000..92810ea1811 --- /dev/null +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35176.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-35176", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2023-06-30T16:15:09.687", + "lastModified": "2023-06-30T16:15:09.687", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow and/or Denial of Service when using the backup & restore feature through the embedded web service on the device." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_8651671-8651697-16/hpsbpi03852", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35177.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35177.json new file mode 100644 index 00000000000..42d4716723a --- /dev/null +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35177.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-35177", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2023-06-30T16:15:09.737", + "lastModified": "2023-06-30T16:15:09.737", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Certain HP LaserJet Pro print products are potentially vulnerable to a stack-based buffer overflow related to the compact font format parser." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_8651888-8651916-16/hpsbpi03853", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35178.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35178.json new file mode 100644 index 00000000000..9b4d7f03b12 --- /dev/null +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35178.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-35178", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2023-06-30T16:15:09.787", + "lastModified": "2023-06-30T16:15:09.787", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow when performing a GET request to scan jobs." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_8651729-8651769-16/hpsbpi03854", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35695.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35695.json index 52b530c0fe4..c0a4f045cc2 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35695.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35695.json @@ -2,23 +2,83 @@ "id": "CVE-2023-35695", "sourceIdentifier": "security@trendmicro.com", "published": "2023-06-26T22:15:11.387", - "lastModified": "2023-06-26T22:22:30.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:49:14.680", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A remote attacker could leverage a vulnerability in Trend Micro Mobile Security (Enterprise) 9.8 SP5 to download a particular log file which may contain sensitive information regarding the product." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trendmicro:mobile_security:9.8:sp5:*:*:enterprise:windows:*:*", + "matchCriteriaId": "B72F17DB-148B-4426-968C-F7CF94DAF717" + } + ] + } + ] + } + ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://www.tenable.com/security/research/tra-2023-17", - "source": "security@trendmicro.com" + "source": "security@trendmicro.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35855.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35855.json index 02f55226dc5..a3cb3cc5f50 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35855.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35855.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35855", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T04:15:11.363", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:15:06.973", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,68 @@ "value": "Un desbordamiento de b\u00fafer en Counter-Strike a trav\u00e9s de 8684 permite a un servidor de juegos ejecutar c\u00f3digo arbitrario en la m\u00e1quina de un cliente remoto modificando la variable de consola \"lservercfgfile\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:valvesoftware:counter-strike:*:*:*:*:*:*:*:*", + "versionEndIncluding": "8684", + "matchCriteriaId": "DF838908-A57C-47C9-8742-C872D9847C5F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/MikeIsAStar/Counter-Strike-Remote-Code-Execution", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35856.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35856.json index 40880c4f741..c77e0aae7bf 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35856.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35856.json @@ -2,19 +2,89 @@ "id": "CVE-2023-35856", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T04:15:11.430", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:08:42.590", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A buffer overflow in Nintendo Mario Kart Wii RMCP01, RMCE01, RMCJ01, and RMCK01 can be exploited by a game client to execute arbitrary code on a client's machine via a crafted packet." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nintendo:mario_kart_wii:rmce01:*:*:*:*:*:*:*", + "matchCriteriaId": "AF406D0D-8207-444D-95C1-EBF86EE6295D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nintendo:mario_kart_wii:rmcj01:*:*:*:*:*:*:*", + "matchCriteriaId": "507126E3-EDA4-4DD9-967F-EB806B1C712A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nintendo:mario_kart_wii:rmck01:*:*:*:*:*:*:*", + "matchCriteriaId": "1A66CE48-A1F1-470D-8F31-E8250238B66C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nintendo:mario_kart_wii:rmcp01:*:*:*:*:*:*:*", + "matchCriteriaId": "BC865F52-0507-4CAF-A087-EA05C0BE6D75" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/MikeIsAStar/Mario-Kart-Wii-Remote-Code-Execution", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-361xx/CVE-2023-36191.json b/CVE-2023/CVE-2023-361xx/CVE-2023-36191.json index 7b78f2ad405..cd0db4b6a4f 100644 --- a/CVE-2023/CVE-2023-361xx/CVE-2023-36191.json +++ b/CVE-2023/CVE-2023-361xx/CVE-2023-36191.json @@ -2,19 +2,75 @@ "id": "CVE-2023-36191", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-23T02:15:09.597", - "lastModified": "2023-06-23T13:03:31.027", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:30:51.853", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "sqlite3 v3.40.1 was discovered to contain a segmentation violation at /sqlite3_aflpp/shell.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sqlite:sqlite:3.40.1:*:*:*:*:*:*:*", + "matchCriteriaId": "DACE324B-C8FE-46BD-930B-63706E43981D" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.sqlite.org/forum/forumpost/19f55ef73b", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-361xx/CVE-2023-36192.json b/CVE-2023/CVE-2023-361xx/CVE-2023-36192.json index 472fa300234..1b025c412a9 100644 --- a/CVE-2023/CVE-2023-361xx/CVE-2023-36192.json +++ b/CVE-2023/CVE-2023-361xx/CVE-2023-36192.json @@ -2,19 +2,76 @@ "id": "CVE-2023-36192", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-23T02:15:09.650", - "lastModified": "2023-06-23T13:03:31.027", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:41:14.160", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Sngrep v1.6.0 was discovered to contain a heap buffer overflow via the function capture_ws_check_packet at /src/capture.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:irontec:sngrep:1.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "86F5A8B5-378C-45C8-8F83-4012F88FBEFD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/irontec/sngrep/issues/438", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-361xx/CVE-2023-36193.json b/CVE-2023/CVE-2023-361xx/CVE-2023-36193.json index 73219d92a29..d30b5bd88db 100644 --- a/CVE-2023/CVE-2023-361xx/CVE-2023-36193.json +++ b/CVE-2023/CVE-2023-361xx/CVE-2023-36193.json @@ -2,19 +2,77 @@ "id": "CVE-2023-36193", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-23T02:15:09.703", - "lastModified": "2023-06-23T13:03:31.027", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T17:31:02.620", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Gifsicle v1.9.3 was discovered to contain a heap buffer overflow via the ambiguity_error component at /src/clp.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gifsicle_project:gifsicle:1.93:*:*:*:*:*:*:*", + "matchCriteriaId": "A319ACEB-3148-493D-B050-FF4E6D3C4156" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/kohler/gifsicle/issues/191", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36356.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36356.json index 148596be808..1d9b8588674 100644 --- a/CVE-2023/CVE-2023-363xx/CVE-2023-36356.json +++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36356.json @@ -2,19 +2,249 @@ "id": "CVE-2023-36356", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-22T20:15:09.780", - "lastModified": "2023-06-23T13:03:39.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:18:59.383", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "TP-Link TL-WR940N V2/V4/V6, TL-WR841N V8, TL-WR941ND V5, and TL-WR740N V1/V2 were discovered to contain a buffer read out-of-bounds via the component /userRpm/VirtualServerRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr940n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2492A6CA-DFF1-42DC-8800-4A66D8943C33" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr940n:v4:*:*:*:*:*:*:*", + "matchCriteriaId": "2537DC7E-8024-45B5-924C-18C9B702DAFC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr841n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7F95370-1001-4194-A0CB-B3CEA027AB6D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr841n:v8:*:*:*:*:*:*:*", + "matchCriteriaId": "2F9738A0-4CC4-4C8C-A4BA-843395B0AA55" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr740n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13CA99B0-BE20-4850-9D5E-2CC6020C4775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr740n:v1:*:*:*:*:*:*:*", + "matchCriteriaId": "89AF2EC8-F679-4A9D-BB1C-E3EABCC7A086" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr740n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13CA99B0-BE20-4850-9D5E-2CC6020C4775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr740n:v2:*:*:*:*:*:*:*", + "matchCriteriaId": "19CA5AB9-F342-4E8D-9658-569198DDE8F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr940n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2492A6CA-DFF1-42DC-8800-4A66D8943C33" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr940n:v2:*:*:*:*:*:*:*", + "matchCriteriaId": "029B4B03-94CE-41FF-A635-41682AE4B26D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr941nd_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7600C377-2A63-4127-8958-32E04E7983CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr941nd:v5:*:*:*:*:*:*:*", + "matchCriteriaId": "1B0FC0E0-6C5B-49CA-95E3-D4AAC9D51518" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr940n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2492A6CA-DFF1-42DC-8800-4A66D8943C33" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr940n:v6:*:*:*:*:*:*:*", + "matchCriteriaId": "714E7A62-634A-4DF8-B5AF-D6B306808B54" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/4/TL-WR941ND_TL-WR940N_TL-WR740N_userRpm_VirtualServerRpm.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36357.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36357.json index 4a38942867b..1bcb6bb7085 100644 --- a/CVE-2023/CVE-2023-363xx/CVE-2023-36357.json +++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36357.json @@ -2,19 +2,222 @@ "id": "CVE-2023-36357", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-22T20:15:09.823", - "lastModified": "2023-06-23T13:03:39.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-30T16:26:56.567", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the /userRpm/LocalManageControlRpm component of TP-Link TL-WR940N V2/V4/V6, TL-WR841N V8/V10, and TL-WR941ND V5 allows attackers to cause a Denial of Service (DoS) via a crafted GET request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr940n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2492A6CA-DFF1-42DC-8800-4A66D8943C33" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr940n:v4:*:*:*:*:*:*:*", + "matchCriteriaId": "2537DC7E-8024-45B5-924C-18C9B702DAFC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr841n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7F95370-1001-4194-A0CB-B3CEA027AB6D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr841n:v8:*:*:*:*:*:*:*", + "matchCriteriaId": "2F9738A0-4CC4-4C8C-A4BA-843395B0AA55" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr841n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7F95370-1001-4194-A0CB-B3CEA027AB6D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr841n:v10:*:*:*:*:*:*:*", + "matchCriteriaId": "BDC4230D-3A3A-4D0E-BBD3-79C3054E90F8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr940n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2492A6CA-DFF1-42DC-8800-4A66D8943C33" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr940n:v2:*:*:*:*:*:*:*", + "matchCriteriaId": "029B4B03-94CE-41FF-A635-41682AE4B26D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr941nd_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7600C377-2A63-4127-8958-32E04E7983CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr941nd:v5:*:*:*:*:*:*:*", + "matchCriteriaId": "1B0FC0E0-6C5B-49CA-95E3-D4AAC9D51518" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr940n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2492A6CA-DFF1-42DC-8800-4A66D8943C33" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr940n:v6:*:*:*:*:*:*:*", + "matchCriteriaId": "714E7A62-634A-4DF8-B5AF-D6B306808B54" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/5/TL-WR941ND_TL-WR940N_TL-WR841N_userRpm_LocalManageControlRpm.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37300.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37300.json new file mode 100644 index 00000000000..85727ffa9c2 --- /dev/null +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37300.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-37300", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-30T17:15:09.477", + "lastModified": "2023-06-30T17:15:09.477", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the CheckUserLog API in the CheckUser extension for MediaWiki through 1.39.3. There is incorrect access control for visibility of hidden users." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gerrit.wikimedia.org/r/q/I993fdcae1fedb7dd543b35a477026bc727615b0a", + "source": "cve@mitre.org" + }, + { + "url": "https://phabricator.wikimedia.org/T330968", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37301.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37301.json new file mode 100644 index 00000000000..243b91135ae --- /dev/null +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37301.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-37301", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-30T17:15:09.527", + "lastModified": "2023-06-30T17:15:09.527", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in SubmitEntityAction in Wikibase in MediaWiki through 1.39.3. Because it doesn't use EditEntity for undo and restore, the intended interaction with AbuseFilter does not occur." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933663", + "source": "cve@mitre.org" + }, + { + "url": "https://phabricator.wikimedia.org/T250720", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37302.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37302.json new file mode 100644 index 00000000000..399d24c0c0d --- /dev/null +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37302.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-37302", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-30T17:15:09.573", + "lastModified": "2023-06-30T17:15:09.573", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in SiteLinksView.php in Wikibase in MediaWiki through 1.39.3. There is XSS via a crafted badge title attribute. This is also related to lack of escaping in wbTemplate (from resources/wikibase/templates.js) for quotes (which can be in a title attribute)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933649", + "source": "cve@mitre.org" + }, + { + "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933650", + "source": "cve@mitre.org" + }, + { + "url": "https://phabricator.wikimedia.org/T339111", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37303.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37303.json new file mode 100644 index 00000000000..c411e1a89bc --- /dev/null +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37303.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-37303", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-30T17:15:09.617", + "lastModified": "2023-06-30T17:15:09.617", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the CheckUser extension for MediaWiki through 1.39.3. In certain situations, an attempt to block a user fails after a temporary browser hang and a DBQueryDisconnectedError error message." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gerrit.wikimedia.org/r/q/I10a9273c542576b3f7bb38de68dcd2aa41cfb1b0", + "source": "cve@mitre.org" + }, + { + "url": "https://phabricator.wikimedia.org/T338276", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37304.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37304.json new file mode 100644 index 00000000000..12eac19e103 --- /dev/null +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37304.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-37304", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-30T17:15:09.660", + "lastModified": "2023-06-30T17:15:09.660", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the DoubleWiki extension for MediaWiki through 1.39.3. includes/DoubleWiki.php allows XSS via the column alignment feature." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/DoubleWiki/+/932825", + "source": "cve@mitre.org" + }, + { + "url": "https://phabricator.wikimedia.org/T323651", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37305.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37305.json new file mode 100644 index 00000000000..68c2f4b90a9 --- /dev/null +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37305.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-37305", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-30T17:15:09.707", + "lastModified": "2023-06-30T17:15:09.707", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the ProofreadPage (aka Proofread Page) extension for MediaWiki through 1.39.3. In includes/Page/PageContentHandler.php and includes/Page/PageDisplayHandler.php, hidden users can be exposed via public interfaces." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gerrit.wikimedia.org/r/q/Ibe5f8e25dea155bbd811a65833394c0d4b906a34", + "source": "cve@mitre.org" + }, + { + "url": "https://phabricator.wikimedia.org/T326952", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37306.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37306.json new file mode 100644 index 00000000000..62f8c8c047d --- /dev/null +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37306.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-37306", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-30T17:15:09.757", + "lastModified": "2023-06-30T17:15:09.757", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "MISP 2.4.172 mishandles different certificate file extensions in server sync. An attacker can obtain sensitive information because of the nature of the error messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/MISP/MISP/commit/f125630c1c2d0f5d11079d3653ab7bb2ab5cd908", + "source": "cve@mitre.org" + }, + { + "url": "https://www.synacktiv.com/publications/php-filter-chains-file-read-from-error-based-oracle", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37307.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37307.json new file mode 100644 index 00000000000..1bb69798966 --- /dev/null +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37307.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-37307", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-30T17:15:09.800", + "lastModified": "2023-06-30T17:15:09.800", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In MISP before 2.4.172, title_for_layout is not properly sanitized in Correlations, CorrelationExclusions, and Layouts." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/MISP/MISP/commit/286c84fab0047726a6a396ceefaae1bb666fc485", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/MISP/MISP/compare/v2.4.171...v2.4.172", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 7e0d3e721c4..5d085b25d00 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-30T16:00:33.771640+00:00 +2023-06-30T18:00:39.608665+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-30T15:58:40.550000+00:00 +2023-06-30T18:00:02.733000+00:00 ``` ### Last Data Feed Release @@ -29,46 +29,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -218945 +218959 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `14` -* [CVE-2023-33276](CVE-2023/CVE-2023-332xx/CVE-2023-33276.json) (`2023-06-30T14:15:09.427`) -* [CVE-2023-37298](CVE-2023/CVE-2023-372xx/CVE-2023-37298.json) (`2023-06-30T15:15:09.007`) -* [CVE-2023-37299](CVE-2023/CVE-2023-372xx/CVE-2023-37299.json) (`2023-06-30T15:15:09.053`) +* [CVE-2023-26299](CVE-2023/CVE-2023-262xx/CVE-2023-26299.json) (`2023-06-30T16:15:09.543`) +* [CVE-2023-34840](CVE-2023/CVE-2023-348xx/CVE-2023-34840.json) (`2023-06-30T16:15:09.600`) +* [CVE-2023-35175](CVE-2023/CVE-2023-351xx/CVE-2023-35175.json) (`2023-06-30T16:15:09.643`) +* [CVE-2023-35176](CVE-2023/CVE-2023-351xx/CVE-2023-35176.json) (`2023-06-30T16:15:09.687`) +* [CVE-2023-35177](CVE-2023/CVE-2023-351xx/CVE-2023-35177.json) (`2023-06-30T16:15:09.737`) +* [CVE-2023-35178](CVE-2023/CVE-2023-351xx/CVE-2023-35178.json) (`2023-06-30T16:15:09.787`) +* [CVE-2023-37300](CVE-2023/CVE-2023-373xx/CVE-2023-37300.json) (`2023-06-30T17:15:09.477`) +* [CVE-2023-37301](CVE-2023/CVE-2023-373xx/CVE-2023-37301.json) (`2023-06-30T17:15:09.527`) +* [CVE-2023-37302](CVE-2023/CVE-2023-373xx/CVE-2023-37302.json) (`2023-06-30T17:15:09.573`) +* [CVE-2023-37303](CVE-2023/CVE-2023-373xx/CVE-2023-37303.json) (`2023-06-30T17:15:09.617`) +* [CVE-2023-37304](CVE-2023/CVE-2023-373xx/CVE-2023-37304.json) (`2023-06-30T17:15:09.660`) +* [CVE-2023-37305](CVE-2023/CVE-2023-373xx/CVE-2023-37305.json) (`2023-06-30T17:15:09.707`) +* [CVE-2023-37306](CVE-2023/CVE-2023-373xx/CVE-2023-37306.json) (`2023-06-30T17:15:09.757`) +* [CVE-2023-37307](CVE-2023/CVE-2023-373xx/CVE-2023-37307.json) (`2023-06-30T17:15:09.800`) ### CVEs modified in the last Commit -Recently modified CVEs: `24` +Recently modified CVEs: `63` -* [CVE-2023-29707](CVE-2023/CVE-2023-297xx/CVE-2023-29707.json) (`2023-06-30T14:03:49.057`) -* [CVE-2023-34601](CVE-2023/CVE-2023-346xx/CVE-2023-34601.json) (`2023-06-30T14:05:14.080`) -* [CVE-2023-33190](CVE-2023/CVE-2023-331xx/CVE-2023-33190.json) (`2023-06-30T14:15:09.353`) -* [CVE-2023-34642](CVE-2023/CVE-2023-346xx/CVE-2023-34642.json) (`2023-06-30T14:15:09.480`) -* [CVE-2023-30902](CVE-2023/CVE-2023-309xx/CVE-2023-30902.json) (`2023-06-30T14:15:33.933`) -* [CVE-2023-32388](CVE-2023/CVE-2023-323xx/CVE-2023-32388.json) (`2023-06-30T14:16:25.170`) -* [CVE-2023-32554](CVE-2023/CVE-2023-325xx/CVE-2023-32554.json) (`2023-06-30T14:26:36.230`) -* [CVE-2023-32553](CVE-2023/CVE-2023-325xx/CVE-2023-32553.json) (`2023-06-30T14:27:02.910`) -* [CVE-2023-32530](CVE-2023/CVE-2023-325xx/CVE-2023-32530.json) (`2023-06-30T14:33:26.047`) -* [CVE-2023-32552](CVE-2023/CVE-2023-325xx/CVE-2023-32552.json) (`2023-06-30T14:36:57.970`) -* [CVE-2023-32537](CVE-2023/CVE-2023-325xx/CVE-2023-32537.json) (`2023-06-30T14:37:11.727`) -* [CVE-2023-32536](CVE-2023/CVE-2023-325xx/CVE-2023-32536.json) (`2023-06-30T14:37:22.800`) -* [CVE-2023-32535](CVE-2023/CVE-2023-325xx/CVE-2023-32535.json) (`2023-06-30T14:37:40.420`) -* [CVE-2023-32534](CVE-2023/CVE-2023-325xx/CVE-2023-32534.json) (`2023-06-30T14:37:48.250`) -* [CVE-2023-32533](CVE-2023/CVE-2023-325xx/CVE-2023-32533.json) (`2023-06-30T14:37:55.680`) -* [CVE-2023-32532](CVE-2023/CVE-2023-325xx/CVE-2023-32532.json) (`2023-06-30T14:38:02.893`) -* [CVE-2023-32531](CVE-2023/CVE-2023-325xx/CVE-2023-32531.json) (`2023-06-30T14:38:23.707`) -* [CVE-2023-28800](CVE-2023/CVE-2023-288xx/CVE-2023-28800.json) (`2023-06-30T15:08:41.290`) -* [CVE-2023-32528](CVE-2023/CVE-2023-325xx/CVE-2023-32528.json) (`2023-06-30T15:17:43.777`) -* [CVE-2023-32527](CVE-2023/CVE-2023-325xx/CVE-2023-32527.json) (`2023-06-30T15:19:55.490`) -* [CVE-2023-23841](CVE-2023/CVE-2023-238xx/CVE-2023-23841.json) (`2023-06-30T15:27:38.070`) -* [CVE-2023-29708](CVE-2023/CVE-2023-297xx/CVE-2023-29708.json) (`2023-06-30T15:36:24.177`) -* [CVE-2023-30222](CVE-2023/CVE-2023-302xx/CVE-2023-30222.json) (`2023-06-30T15:52:51.067`) -* [CVE-2023-30223](CVE-2023/CVE-2023-302xx/CVE-2023-30223.json) (`2023-06-30T15:58:40.550`) +* [CVE-2023-23539](CVE-2023/CVE-2023-235xx/CVE-2023-23539.json) (`2023-06-30T16:53:58.180`) +* [CVE-2023-27396](CVE-2023/CVE-2023-273xx/CVE-2023-27396.json) (`2023-06-30T17:08:06.930`) +* [CVE-2023-35856](CVE-2023/CVE-2023-358xx/CVE-2023-35856.json) (`2023-06-30T17:08:42.590`) +* [CVE-2023-32522](CVE-2023/CVE-2023-325xx/CVE-2023-32522.json) (`2023-06-30T17:10:43.140`) +* [CVE-2023-35855](CVE-2023/CVE-2023-358xx/CVE-2023-35855.json) (`2023-06-30T17:15:06.973`) +* [CVE-2023-28799](CVE-2023/CVE-2023-287xx/CVE-2023-28799.json) (`2023-06-30T17:15:59.797`) +* [CVE-2023-34462](CVE-2023/CVE-2023-344xx/CVE-2023-34462.json) (`2023-06-30T17:21:12.957`) +* [CVE-2023-36193](CVE-2023/CVE-2023-361xx/CVE-2023-36193.json) (`2023-06-30T17:31:02.620`) +* [CVE-2023-2711](CVE-2023/CVE-2023-27xx/CVE-2023-2711.json) (`2023-06-30T17:36:44.303`) +* [CVE-2023-2743](CVE-2023/CVE-2023-27xx/CVE-2023-2743.json) (`2023-06-30T17:40:00.627`) +* [CVE-2023-2744](CVE-2023/CVE-2023-27xx/CVE-2023-2744.json) (`2023-06-30T17:41:02.260`) +* [CVE-2023-3128](CVE-2023/CVE-2023-31xx/CVE-2023-3128.json) (`2023-06-30T17:49:02.207`) +* [CVE-2023-35695](CVE-2023/CVE-2023-356xx/CVE-2023-35695.json) (`2023-06-30T17:49:14.680`) +* [CVE-2023-32320](CVE-2023/CVE-2023-323xx/CVE-2023-32320.json) (`2023-06-30T17:49:57.387`) +* [CVE-2023-21169](CVE-2023/CVE-2023-211xx/CVE-2023-21169.json) (`2023-06-30T17:50:07.150`) +* [CVE-2023-21170](CVE-2023/CVE-2023-211xx/CVE-2023-21170.json) (`2023-06-30T17:52:59.093`) +* [CVE-2023-34148](CVE-2023/CVE-2023-341xx/CVE-2023-34148.json) (`2023-06-30T17:53:51.130`) +* [CVE-2023-34147](CVE-2023/CVE-2023-341xx/CVE-2023-34147.json) (`2023-06-30T17:56:50.020`) +* [CVE-2023-34146](CVE-2023/CVE-2023-341xx/CVE-2023-34146.json) (`2023-06-30T17:58:09.347`) +* [CVE-2023-34145](CVE-2023/CVE-2023-341xx/CVE-2023-34145.json) (`2023-06-30T17:58:29.067`) +* [CVE-2023-34144](CVE-2023/CVE-2023-341xx/CVE-2023-34144.json) (`2023-06-30T17:58:49.123`) +* [CVE-2023-21171](CVE-2023/CVE-2023-211xx/CVE-2023-21171.json) (`2023-06-30T17:58:56.977`) +* [CVE-2023-32605](CVE-2023/CVE-2023-326xx/CVE-2023-32605.json) (`2023-06-30T17:59:17.467`) +* [CVE-2023-32604](CVE-2023/CVE-2023-326xx/CVE-2023-32604.json) (`2023-06-30T17:59:30.717`) +* [CVE-2023-32557](CVE-2023/CVE-2023-325xx/CVE-2023-32557.json) (`2023-06-30T18:00:02.733`) ## Download and Usage