diff --git a/CVE-2011/CVE-2011-12xx/CVE-2011-1207.json b/CVE-2011/CVE-2011-12xx/CVE-2011-1207.json index 2be60c733ea..83a96c4bd00 100644 --- a/CVE-2011/CVE-2011-12xx/CVE-2011-1207.json +++ b/CVE-2011/CVE-2011-12xx/CVE-2011-1207.json @@ -2,7 +2,7 @@ "id": "CVE-2011-1207", "sourceIdentifier": "cve@mitre.org", "published": "2011-05-05T02:39:46.057", - "lastModified": "2011-05-31T04:00:00.000", + "lastModified": "2023-05-30T18:20:22.373", "vulnStatus": "Analyzed", "descriptions": [ { @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "CWE-863" } ] } @@ -109,11 +109,19 @@ "references": [ { "url": "http://securitytracker.com/id?1025464", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/47643", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2011/1129", diff --git a/CVE-2015/CVE-2015-66xx/CVE-2015-6639.json b/CVE-2015/CVE-2015-66xx/CVE-2015-6639.json index 349bfce75a5..06e4be762de 100644 --- a/CVE-2015/CVE-2015-66xx/CVE-2015-6639.json +++ b/CVE-2015/CVE-2015-66xx/CVE-2015-6639.json @@ -2,7 +2,7 @@ "id": "CVE-2015-6639", "sourceIdentifier": "security@android.com", "published": "2016-01-06T19:59:04.313", - "lastModified": "2017-09-07T01:29:00.697", + "lastModified": "2023-05-30T19:15:09.253", "vulnStatus": "Modified", "descriptions": [ { @@ -108,6 +108,14 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172637/Widevine-Trustlet-5.x-6.x-7.x-PRDiagVerifyProvisioning-Buffer-Overflow.html", + "source": "security@android.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2023/May/26", + "source": "security@android.com" + }, { "url": "http://source.android.com/security/bulletin/2016-01-01.html", "source": "security@android.com", diff --git a/CVE-2015/CVE-2015-66xx/CVE-2015-6647.json b/CVE-2015/CVE-2015-66xx/CVE-2015-6647.json index f540b03b93b..6d3e31b3164 100644 --- a/CVE-2015/CVE-2015-66xx/CVE-2015-6647.json +++ b/CVE-2015/CVE-2015-66xx/CVE-2015-6647.json @@ -2,7 +2,7 @@ "id": "CVE-2015-6647", "sourceIdentifier": "security@android.com", "published": "2016-01-06T19:59:12.833", - "lastModified": "2016-12-07T18:20:59.047", + "lastModified": "2023-05-30T19:15:09.320", "vulnStatus": "Modified", "descriptions": [ { @@ -118,6 +118,14 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172637/Widevine-Trustlet-5.x-6.x-7.x-PRDiagVerifyProvisioning-Buffer-Overflow.html", + "source": "security@android.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2023/May/26", + "source": "security@android.com" + }, { "url": "http://source.android.com/security/bulletin/2016-01-01.html", "source": "security@android.com", diff --git a/CVE-2018/CVE-2018-86xx/CVE-2018-8661.json b/CVE-2018/CVE-2018-86xx/CVE-2018-8661.json new file mode 100644 index 00000000000..923c54ae4bd --- /dev/null +++ b/CVE-2018/CVE-2018-86xx/CVE-2018-8661.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2018-8661", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-30T18:15:09.797", + "lastModified": "2023-05-30T18:15:09.797", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-200xx/CVE-2020-20012.json b/CVE-2020/CVE-2020-200xx/CVE-2020-20012.json index 84094619a4f..f84e1a324ee 100644 --- a/CVE-2020/CVE-2020-200xx/CVE-2020-20012.json +++ b/CVE-2020/CVE-2020-200xx/CVE-2020-20012.json @@ -2,23 +2,82 @@ "id": "CVE-2020-20012", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:09.627", - "lastModified": "2023-05-23T13:04:39.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-30T18:22:15.727", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "WebPlus Pro v1.4.7.8.4-01 is vulnerable to Incorrect Access Control." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sudytech:webplus_pro:1.4.7.8.4-01:*:*:*:*:*:*:*", + "matchCriteriaId": "449E4E1E-CF9E-48D2-BF66-265E293F3DDE" + } + ] + } + ] + } + ], "references": [ { "url": "http://wzqpt.hfut.edu.cn/login.jsp?_p=YXM9MSZwPTEmbT1OJg__", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://gist.github.com/1915504804/9503198d3cbd5bc7db47625ac0caaade", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-275xx/CVE-2020-27507.json b/CVE-2020/CVE-2020-275xx/CVE-2020-27507.json index a5df27d8ab4..33b548ab377 100644 --- a/CVE-2020/CVE-2020-275xx/CVE-2020-27507.json +++ b/CVE-2020/CVE-2020-275xx/CVE-2020-27507.json @@ -2,8 +2,8 @@ "id": "CVE-2020-27507", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-15T20:15:10.283", - "lastModified": "2023-03-19T03:50:16.077", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-30T19:15:09.483", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -79,6 +79,10 @@ "Exploit", "Issue Tracking" ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00030.html", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4240.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4240.json index 42065e55dec..d23d11fb9ed 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4240.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4240.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4240", "sourceIdentifier": "psirt@honeywell.com", "published": "2023-05-30T17:15:09.810", - "lastModified": "2023-05-30T17:15:09.810", - "vulnStatus": "Received", + "lastModified": "2023-05-30T18:52:32.890", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43485.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43485.json index 0c7131d72ed..bb1a0282ec2 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43485.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43485.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43485", "sourceIdentifier": "psirt@honeywell.com", "published": "2023-05-30T17:15:09.573", - "lastModified": "2023-05-30T17:15:09.573", - "vulnStatus": "Received", + "lastModified": "2023-05-30T18:52:32.890", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46361.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46361.json index 1bebf417759..808caec9f8f 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46361.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46361.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46361", "sourceIdentifier": "psirt@honeywell.com", "published": "2023-05-30T17:15:09.737", - "lastModified": "2023-05-30T17:15:09.737", - "vulnStatus": "Received", + "lastModified": "2023-05-30T18:52:32.890", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-466xx/CVE-2022-46658.json b/CVE-2022/CVE-2022-466xx/CVE-2022-46658.json index 7627559566a..37360b2a037 100644 --- a/CVE-2022/CVE-2022-466xx/CVE-2022-46658.json +++ b/CVE-2022/CVE-2022-466xx/CVE-2022-46658.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46658", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T23:15:09.270", - "lastModified": "2023-05-23T13:04:39.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-30T18:17:14.057", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -46,14 +66,640 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "05060302-F6DE-4EAF-9356-8CD785ABDE7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "936B8451-A674-49D7-91EC-A03599A6D6AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "6D2071B9-BF2C-4A12-BA35-32BB59E210DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1469E464-6784-4B0B-9895-79BA5A1A1CB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "166422E2-0734-4F7E-B2FE-0EB461AFDD32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82C1859A-0D39-4D69-B89F-E6AB92D71A38" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "80159239-E373-4399-AF14-5FC3B1F7BFBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A017B904-A3C4-4070-96F7-9679FD2383C9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "7FCCC5B8-ED6E-4FCA-BA07-4D2AA1D26F50" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23BC31CA-2061-4141-8600-EF4A9AE7DD2A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "D43D904E-6B72-44B4-A158-D6A7C30504A3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1A43409-AF18-4BD5-A0D4-D27CDD6ABBE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "AB35A114-99E7-44C6-B53B-B293AA9D9815" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56E2CAAD-8A4D-4F1A-AEF0-034C02965935" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "C37DFE8A-F733-48D3-8BF6-ECC98A476C54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACA11FBB-1B4C-4F66-89EF-2D91C0161C4C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "DAD2CA81-44E6-4499-9F5C-502F060A3B8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58CE9F4A-74BD-4AFC-B019-5D750E2D1E16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "6E012434-72F0-4BD6-ACA4-DF7E12FB9033" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B64FEC33-D6D9-4F4C-BE43-31D637E6B01F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "F08FCBA2-94B8-44F9-921F-0CDD03D7903A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B1D3E7F-9C2F-48F8-BF49-539570A0986A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "3577400F-ADC8-4EBF-AFEE-DE165391BE12" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DFC4885-AF94-471E-AE4E-DD26A6A91667" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "02EF4F49-FCB7-44C8-BC83-8A3519807338" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12B9705B-B21D-450B-A62B-933DC81A19E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "B170FD2A-0422-4778-812F-EBCDF19A1253" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B786B2F4-6586-4E05-BDE9-DFDBA7BD3739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "2CC4192B-D9F4-4886-BDDE-5859A89B6221" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEBA453E-67D9-4760-89A6-6CF8C632C6A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "A64CD7F9-D8BB-4717-90B5-FBFE01B00CB5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5042C3C1-3964-437B-98C1-0458F73B7197" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "AB49899D-165E-4B57-A3F5-D6ADDD138E12" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBD2B738-620D-42F8-881C-A6B293B724BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "E032CC0E-0E19-490A-B3A2-5BA82DA52FC0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1C46D12-6699-4BAC-AC47-7B150AECAF9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "CE9621CA-4AC7-4BA5-940D-E76E795502A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1139B205-02DA-4155-897C-F5D4191686A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "BC0AB74D-DFDD-4B8F-9AFB-158E8C09A6F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C10BFD7F-0EDC-4CA0-9BEE-2CD0C83CAA05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "EF765E11-57A1-444F-840B-321944679F4B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "518EE433-9E08-40FE-90F7-48E8AC934743" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "D4AD7C27-EFF5-4302-9B7F-0AFF190F1893" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1522EB30-AB31-47E3-B2EB-90CE231C284B" + } + ] + } + ] + } + ], "references": [ { "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Product" + ] }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Patch", + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4945.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4945.json index b35f48237fb..380c7e7a605 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4945.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4945.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4945", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T22:15:09.870", - "lastModified": "2023-05-23T13:04:39.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-30T18:05:33.233", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -46,14 +66,640 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "05060302-F6DE-4EAF-9356-8CD785ABDE7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "936B8451-A674-49D7-91EC-A03599A6D6AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "6D2071B9-BF2C-4A12-BA35-32BB59E210DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1469E464-6784-4B0B-9895-79BA5A1A1CB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "166422E2-0734-4F7E-B2FE-0EB461AFDD32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82C1859A-0D39-4D69-B89F-E6AB92D71A38" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "80159239-E373-4399-AF14-5FC3B1F7BFBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A017B904-A3C4-4070-96F7-9679FD2383C9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "7FCCC5B8-ED6E-4FCA-BA07-4D2AA1D26F50" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23BC31CA-2061-4141-8600-EF4A9AE7DD2A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "D43D904E-6B72-44B4-A158-D6A7C30504A3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1A43409-AF18-4BD5-A0D4-D27CDD6ABBE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "AB35A114-99E7-44C6-B53B-B293AA9D9815" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56E2CAAD-8A4D-4F1A-AEF0-034C02965935" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "C37DFE8A-F733-48D3-8BF6-ECC98A476C54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACA11FBB-1B4C-4F66-89EF-2D91C0161C4C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "DAD2CA81-44E6-4499-9F5C-502F060A3B8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58CE9F4A-74BD-4AFC-B019-5D750E2D1E16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "6E012434-72F0-4BD6-ACA4-DF7E12FB9033" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B64FEC33-D6D9-4F4C-BE43-31D637E6B01F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "F08FCBA2-94B8-44F9-921F-0CDD03D7903A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B1D3E7F-9C2F-48F8-BF49-539570A0986A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "3577400F-ADC8-4EBF-AFEE-DE165391BE12" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DFC4885-AF94-471E-AE4E-DD26A6A91667" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "02EF4F49-FCB7-44C8-BC83-8A3519807338" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12B9705B-B21D-450B-A62B-933DC81A19E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "B170FD2A-0422-4778-812F-EBCDF19A1253" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B786B2F4-6586-4E05-BDE9-DFDBA7BD3739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "2CC4192B-D9F4-4886-BDDE-5859A89B6221" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEBA453E-67D9-4760-89A6-6CF8C632C6A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "A64CD7F9-D8BB-4717-90B5-FBFE01B00CB5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5042C3C1-3964-437B-98C1-0458F73B7197" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "AB49899D-165E-4B57-A3F5-D6ADDD138E12" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBD2B738-620D-42F8-881C-A6B293B724BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "E032CC0E-0E19-490A-B3A2-5BA82DA52FC0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1C46D12-6699-4BAC-AC47-7B150AECAF9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "CE9621CA-4AC7-4BA5-940D-E76E795502A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1139B205-02DA-4155-897C-F5D4191686A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "BC0AB74D-DFDD-4B8F-9AFB-158E8C09A6F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C10BFD7F-0EDC-4CA0-9BEE-2CD0C83CAA05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "EF765E11-57A1-444F-840B-321944679F4B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "518EE433-9E08-40FE-90F7-48E8AC934743" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "D4AD7C27-EFF5-4302-9B7F-0AFF190F1893" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1522EB30-AB31-47E3-B2EB-90CE231C284B" + } + ] + } + ] + } + ], "references": [ { "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Product" + ] }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Patch", + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1711.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1711.json new file mode 100644 index 00000000000..5cd8c4d60af --- /dev/null +++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1711.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-1711", + "sourceIdentifier": "cybersecurity@hitachienergy.com", + "published": "2023-05-30T19:15:09.753", + "lastModified": "2023-05-30T19:15:09.753", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability exists in a FOXMAN-UN and UNEM logging component, it only affects systems that use remote authentication to the network elements. \nIf exploited an attacker could obtain confidential information.\n\n\n\nList of CPEs:\n * cpe:2.3:a:hitachienergy:foxman_un:R9C:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy:foxman_un:R10C:*:*:*:*:*:*:*\n\n * cpe:2.3:a:hitachienergy:foxman_un:R11A:*:*:*:*:*:*:*\n\n * cpe:2.3:a:hitachienergy:foxman_un:R11B:*:*:*:*:*:*:*\n\n * cpe:2.3:a:hitachienergy:foxman_un:R14A:*:*:*:*:*:*:*\n\n * cpe:2.3:a:hitachienergy:foxman_un:R14B:*:*:*:*:*:*:*\n\n * cpe:2.3:a:hitachienergy:foxman_un:R15A:*:*:*:*:*:*:*\n\n * cpe:2.3:a:hitachienergy:foxman_un:R15B:*:*:*:*:*:*:*\n\n * cpe:2.3:a:hitachienergy:foxman_un:R16A:*:*:*:*:*:*:*\n\n * \n * cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*\n * cpe:2.3:a:hitachienergy: unem :R10C:*:*:*:*:*:*:*\n\n * cpe:2.3:a:hitachienergy: unem :R11A:*:*:*:*:*:*:*\n\n * cpe:2.3:a:hitachienergy: unem :R11B:*:*:*:*:*:*:*\n\n * cpe:2.3:a:hitachienergy: unem :R14A:*:*:*:*:*:*:*\n\n * cpe:2.3:a:hitachienergy: unem :R14B:*:*:*:*:*:*:*\n\n * cpe:2.3:a:hitachienergy: unem :R15A:*:*:*:*:*:*:*\n\n * cpe:2.3:a:hitachienergy: unem :R15B:*:*:*:*:*:*:*\n\n * cpe:2.3:a:hitachienergy: unem :R16A:*:*:*:*:*:*:*\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.3, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-117" + } + ] + } + ], + "references": [ + { + "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000155&LanguageCode=en&DocumentPartId=&Action=Launch", + "source": "cybersecurity@hitachienergy.com" + }, + { + "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000166&LanguageCode=en&DocumentPartId=&Action=Launch", + "source": "cybersecurity@hitachienergy.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23754.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23754.json index 4249e8c17c9..f049beffeda 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23754.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23754.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23754", "sourceIdentifier": "security@joomla.org", "published": "2023-05-30T17:15:09.887", - "lastModified": "2023-05-30T17:15:09.887", - "vulnStatus": "Received", + "lastModified": "2023-05-30T18:52:32.890", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23755.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23755.json index 4cae6ccc41f..a55771bd95a 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23755.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23755.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23755", "sourceIdentifier": "security@joomla.org", "published": "2023-05-30T17:15:09.937", - "lastModified": "2023-05-30T17:15:09.937", - "vulnStatus": "Received", + "lastModified": "2023-05-30T18:52:32.890", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24826.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24826.json index 9c90348b5ca..abf5a21c8f8 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24826.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24826.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24826", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-30T17:15:09.983", - "lastModified": "2023-05-30T17:15:09.983", - "vulnStatus": "Received", + "lastModified": "2023-05-30T18:52:32.890", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2650.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2650.json index ef21e288ab9..2d9309acc3d 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2650.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2650.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2650", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-05-30T14:15:09.683", - "lastModified": "2023-05-30T16:36:55.623", + "lastModified": "2023-05-30T18:15:09.927", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -12,6 +12,10 @@ ], "metrics": {}, "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2023/05/30/1", + "source": "openssl-security@openssl.org" + }, { "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=423a2bc737a908ad0c77bda470b2b59dc879936b", "source": "openssl-security@openssl.org" diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27068.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27068.json index 77d5108404d..42d3dc13cfa 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27068.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27068.json @@ -2,27 +2,90 @@ "id": "CVE-2023-27068", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:09.773", - "lastModified": "2023-05-23T13:04:39.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-30T18:27:39.760", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data in Sitecore Experience Platform through 10.2 allows remote attackers to run arbitrary code via ValidationResult.aspx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.2", + "matchCriteriaId": "B2C36257-4991-451B-9E79-FDAE6CD94178" + } + ] + } + ] + } + ], "references": [ { "url": "https://blogs.night-wolf.io/0-day-vulnerabilities-at-sitecore-pagedesigner", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/103/Sitecore%20Experience%20Platform%20103/Release%20Notes", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.sitecore.com/products/sitecore-experience-platform", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29737.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29737.json index 66c8ba07e09..b0451d9d9bc 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29737.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29737.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29737", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T17:15:10.067", - "lastModified": "2023-05-30T17:15:10.067", - "vulnStatus": "Received", + "lastModified": "2023-05-30T18:52:32.890", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29919.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29919.json index 869d3f65d8b..8ec0e615dbe 100644 --- a/CVE-2023/CVE-2023-299xx/CVE-2023-29919.json +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29919.json @@ -2,23 +2,95 @@ "id": "CVE-2023-29919", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:09.820", - "lastModified": "2023-05-23T13:04:39.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-30T18:35:16.013", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "SolarView Compact <= 6.0 is vulnerable to Insecure Permissions. Any file on the server can be read or modified because texteditor.php is not restricted." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:contec:solarview_compact_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.0", + "matchCriteriaId": "D2E7C145-F26C-45C8-8234-67F42BD795F3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:contec:solarview_compact:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B677303-DBF0-44EF-B33C-1C0EAEF82135" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/xiaosed/CVE-2023-29919/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.solarview.io/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2968.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2968.json new file mode 100644 index 00000000000..7205bd21710 --- /dev/null +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2968.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-2968", + "sourceIdentifier": "reefs@jfrog.com", + "published": "2023-05-30T18:15:09.997", + "lastModified": "2023-05-30T18:52:32.890", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A remote attacker can trigger a denial of service in the socket.remoteAddress variable, by sending a crafted HTTP request. Usage of the undefined variable raises a TypeError exception.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "reefs@jfrog.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "reefs@jfrog.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-232" + } + ] + } + ], + "references": [ + { + "url": "https://research.jfrog.com/vulnerabilities/undefined-variable-usage-in-proxy-leads-to-remote-denial-of-service-xray-520917", + "source": "reefs@jfrog.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2994.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2994.json new file mode 100644 index 00000000000..7fb088904da --- /dev/null +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2994.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2023-2994", + "sourceIdentifier": "security@wordfence.com", + "published": "2023-05-30T18:15:10.077", + "lastModified": "2023-05-30T18:15:10.077", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** This 2023 CVE was incorrectly assigned instead of a 2022 CVE." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31285.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31285.json index 2ee6980bf0e..ac1cc4ec4ba 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31285.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31285.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31285", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-27T03:15:10.107", - "lastModified": "2023-05-30T06:16:32.220", + "lastModified": "2023-05-30T19:15:09.833", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html", + "source": "cve@mitre.org" + }, { "url": "http://seclists.org/fulldisclosure/2023/May/14", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31286.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31286.json index af1f65babd5..cf7a4babb5e 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31286.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31286.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31286", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-27T03:15:10.160", - "lastModified": "2023-05-30T06:16:33.220", + "lastModified": "2023-05-30T19:15:09.897", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html", + "source": "cve@mitre.org" + }, { "url": "http://seclists.org/fulldisclosure/2023/May/14", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31287.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31287.json index 51db808cad0..50d423669fd 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31287.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31287.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31287", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-27T03:15:10.200", - "lastModified": "2023-05-30T06:16:34.137", + "lastModified": "2023-05-30T19:15:09.967", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html", + "source": "cve@mitre.org" + }, { "url": "http://seclists.org/fulldisclosure/2023/May/14", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31664.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31664.json index 40d661bda0b..8a87840fb1e 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31664.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31664.json @@ -2,27 +2,90 @@ "id": "CVE-2023-31664", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:09.867", - "lastModified": "2023-05-23T13:04:39.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-30T18:46:57.883", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A reflected cross-site scripting (XSS) vulnerability in /authenticationendpoint/login.do of WSO2 API Manager before 4.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the tenantDomain parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.2.0", + "matchCriteriaId": "FEC83149-B509-4599-BB07-97309B8B1440" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/adilkhan7/CVE-2023-31664", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/wso2/api-manager/issues?q=is%3Aissue+is%3Aclosed+label%3AComponent%2FAPIM+closed%3A2022-04-05..2023-03-11", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/wso2/product-apim/releases/tag/v4.2.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31740.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31740.json index a646b3e3800..f511ee947d7 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31740.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31740.json @@ -2,23 +2,95 @@ "id": "CVE-2023-31740", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:10.003", - "lastModified": "2023-05-23T13:04:39.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-30T19:17:44.447", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "There is a command injection vulnerability in the Linksys E2000 router with firmware version 1.0.06. If an attacker gains web management privileges, they can inject commands into the post request parameters WL_atten_bb, WL_atten_radio, and WL_atten_ctl in the apply.cgi interface, thereby gaining shell privileges." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e2000_firmware:1.0.06:*:*:*:*:*:*:*", + "matchCriteriaId": "FE947E51-AD41-462E-B0B6-69A21F7D670A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e2000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8052B407-172A-4A6B-983C-074F0FD1F8DB" + } + ] + } + ] + } + ], "references": [ { "url": "http://linksys.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31740/Linksys_E2000_RCE.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31814.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31814.json index 73f4d20f469..6d0c10fb8c4 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31814.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31814.json @@ -2,23 +2,122 @@ "id": "CVE-2023-31814", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:10.087", - "lastModified": "2023-05-23T13:04:34.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-30T19:00:27.487", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "D-Link DIR-300 firmware <=REVA1.06 and <=REVB2.06 is vulnerable to File inclusion via /model/__lang_msg.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-300_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.06", + "matchCriteriaId": "58317720-E35D-4B04-9ED8-20F9891C201B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-300:a:*:*:*:*:*:*:*", + "matchCriteriaId": "EDA56E33-B2C7-4D57-B70A-D1ED9FEDB644" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-300_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.06", + "matchCriteriaId": "022C9ACD-5E0C-412D-8F3D-DC444FF1EDFA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-300:b:*:*:*:*:*:*:*", + "matchCriteriaId": "3C94BE4B-01ED-4300-AEA0-498D3DCF608D" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/1915504804/9503198d3cbd5bc7db47625ac0caaade", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.dlink.com/en/security-bulletin/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31826.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31826.json index 3286cae24da..57a36f4b992 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31826.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31826.json @@ -2,31 +2,96 @@ "id": "CVE-2023-31826", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:10.127", - "lastModified": "2023-05-23T13:04:34.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-30T18:55:20.623", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Skyscreamer Open Source Nevado JMS v1.3.2 does not perform security checks when receiving messages. This allows attackers to execute arbitrary commands via supplying crafted data." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:skyscreamer:nevado_jms:1.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "37A120A3-A27D-498C-AA78-6CE81B8AF39B" + } + ] + } + ] + } + ], "references": [ { "url": "http://nevado.skyscreamer.org/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/skyscreamer/nevado/issues/121", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/skyscreamer/nevado/releases", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://novysodope.github.io/2023/04/01/95/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31995.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31995.json index b1467a6f262..fbddda69ecd 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31995.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31995.json @@ -2,23 +2,3370 @@ "id": "CVE-2023-31995", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:10.207", - "lastModified": "2023-05-30T14:15:09.947", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-30T18:45:24.693", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Hanwha IP Camera ANE-L7012R 1.41.01 is vulnerable to Cross Site Scripting (XSS)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:ane-l6012r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.03", + "matchCriteriaId": "66129289-7682-4C24-90D8-5F1DD592B3C5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:ane-l6012r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B4A42BD-9266-4FF4-B2A7-121EE13D26EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:ane-l7012r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.03", + "matchCriteriaId": "DF1AB2A9-E263-4106-A3ED-2535B07900AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:ane-l7012r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A28D81D-239E-49E3-B007-98C8DE4AB504" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:ano-l6012r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.03", + "matchCriteriaId": "ECF7BDCF-BD91-48E5-AFC0-B68AD873FB0A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:ano-l6012r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95229879-E5C7-4E23-8AD5-C0A9D110A48C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:ano-l6022r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.03", + "matchCriteriaId": "0787B40D-49A3-4D3D-8019-4D16D236F022" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:ano-l6022r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DCDCAF5-1A8B-445C-BE39-71045B5DD744" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:ano-l6082r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.03", + "matchCriteriaId": "9C508D66-0A1A-4E8E-968E-3639FA17B73D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:ano-l6082r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5624134D-6E73-48BC-8DF9-0DD9127CCA17" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:ano-l7012r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.03", + "matchCriteriaId": "1BAA71DC-C894-4C7A-8E92-FD9453C24906" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:ano-l7012r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3805554-0512-4989-91B1-37303A98224D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:ano-l7022r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.03", + "matchCriteriaId": "BA056C0A-5539-4C74-8743-FA44373433AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:ano-l7022r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73C3A01C-403B-435F-BF4A-E25B0461645E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:ano-l7082r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.03", + "matchCriteriaId": "90E14CA5-C6E5-4EEF-87F4-BE7E2C04EB0D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:ano-l7082r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF502C5C-C8AE-4AF5-BA1E-94B31561BB03" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:anv-l6012r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.03", + "matchCriteriaId": "4261466F-AAA2-4468-AE77-7DFD0DC67F76" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:anv-l6012r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07C0FFCA-9F10-45AE-91B4-BA1A4913A169" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:anv-l6023r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.03", + "matchCriteriaId": "FB497755-8191-40EE-ADFA-AC4D236C6644" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:anv-l6023r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "167D6E46-FE49-466E-B0B1-D49838C3362E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:anv-l6082r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.03", + "matchCriteriaId": "8DA6FC2C-3343-4838-AFCD-5B907D502E4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:anv-l6082r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D51829B-81E1-46B0-9E9B-2D2E17EBB38A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:anv-l7012r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.03", + "matchCriteriaId": "0070E615-E1B7-49CD-A919-C71E116D04DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:anv-l7012r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E60E80C-82DE-42A3-A7E7-F00AF5E25CC0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:anv-l7082r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.03", + "matchCriteriaId": "7D9D6F4C-FCCA-42AF-95A3-51867A33B457" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:anv-l7082r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52BC696E-42A3-4D84-9885-D39EF0C90969" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-12082rvd_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "C6698FF5-BF4B-47D0-9C07-F36DB71506A1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-12082rvd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE8415A-44DF-4B96-8CFC-D9D2432AA1A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-7002vd_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "58D54C8D-C08F-4DE8-8D03-9F0DAB808369" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-7002vd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F14CCDB-6E5A-4454-9C8E-F9AFE92EBC1B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-7082rvd_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "99913BA9-3626-43DB-8F5C-FEEC34E248B9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-7082rvd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7EEFEBB0-260A-4CE9-8AE6-E95B53D5E418" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-8082vt_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "91248960-CFB0-4CA2-AF59-CACB3C6F2293" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-8082vt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAC1D3B7-BDF4-40BC-9E29-07D5845A4627" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-9000qb_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "400AEAD3-8A9E-4217-8959-EF45C6DC31F0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-9000qb:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59C549C4-A5D8-4532-98CA-5DF3EFDB2573" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-9000vd_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "172C4460-DA14-48D5-AEA2-D9DBC0493318" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-9000vd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0BB8BECD-11C8-4581-BB54-9EA7BF0FEB4D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-9002vq_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "9295F970-7B92-446C-AD0F-A2668F54F550" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-9002vq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "772CD1A3-C9E2-4DAD-BEFE-D60EF8107F8F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-9022v_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "E73C115D-2ABE-4541-BB3E-324D609A273B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-9022v:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28A6C969-73D3-4240-A1E5-7FBA409B3EB4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-9031rv_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "E43084D8-EE67-4BAE-A260-6145E1C9AE63" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-9031rv:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED4DCF92-8F17-4A73-844E-8EC21AB65782" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-9084qz1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "9ADEF643-D6B6-47EE-8327-97E5EEC47F2B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-9084qz1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A171575-2FB3-440E-A65F-033AA433E24A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-9084rqz_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "1C09BFE1-D947-4DAF-AA97-0FF2CA3C141F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-9084rqz:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14448BEA-A228-48B9-9C7D-BBA26B69B1D1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-9084rqz1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "9A342C48-722B-4B8E-A60D-0F382864E575" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-9084rqz1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B58334F0-E781-44DB-99D8-C76C928F9B4D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-9085rqz_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "7CF6F982-B1F0-4DAA-88FB-E442FD7A6DDB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-9085rqz:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3E118B1-A5D0-425E-A211-07F77A700A53" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-9085rqz1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "C9F5183B-5A41-4603-8AB2-9BB459D50D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-9085rqz1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADB80DF9-AF72-4D7F-A277-524D0CA7D32C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-9322vqp_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "203DA3B4-7008-4620-A29A-D9E300318F3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-9322vqp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF91EA62-F6FA-484F-94EB-5C47D2548CE0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-c12083rvd_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "9C666B16-2BF9-4ABE-AD4F-8674A0468C60" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-c12083rvd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E504A46-2075-4751-9071-58EF6B2B45D0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-c7083rvd_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "3B290A59-5FCB-4315-9EA2-5B30A1A90697" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-c7083rvd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C95D84D-0A5D-4320-99DB-1FCE4EAD7261" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:pnm-c9022rv_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.00", + "matchCriteriaId": "8750CE2A-774F-4D3B-8B3F-3D7D2ABDE62F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:pnm-c9022rv:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1070654-7881-48F1-8389-34AF8D46FE86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-6011_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "F72DDCE3-1CE5-4776-A93B-90A6D4C1DE89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-6011:-:*:*:*:*:*:*:*", + "matchCriteriaId": "800A47DE-3EFF-47C6-9544-D7302F2C7D6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-6012r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "82C548B5-D7F3-421D-9798-146E1F979703" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-6012r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F7DBDB4-1677-4E64-8287-020C5BDC8266" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-6012r1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "9AC2445D-77A3-4A5D-AAD5-71466F98124D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-6012r1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B13DA75-8957-47F0-99EC-439B4C7BBAE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-6021_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "829FB762-6BEB-426F-8E9B-FD21429C7BDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-6021:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E85F8652-4F26-4E3E-8FC8-FCBAAEC01F55" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-6022r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "DA25D7B5-914B-46C3-B4DF-2A76D1E1ECAA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-6022r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B42AB42-B062-412A-886B-C11963C7CCCB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-6082r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "B0EEE679-F0D5-4F5E-8321-E4C774FAD102" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-6082r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D7748B0E-1445-4A5D-833C-4EE0ABE400CD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-6082r1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "CC552E61-C60A-4889-A22C-02807D520AA1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-6082r1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B5B57B7-670F-4E47-913D-B58E0E0F7C5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-70142r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "E1867F7F-3541-446C-B924-3828ACB33233" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-70142r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2418DEF4-704E-4F89-9F11-42E28B39D09A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-7022r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "4D3D3784-2339-4C42-8AD9-8AA7C0E4A0B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-7022r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC9F64AE-E083-4973-BC58-067D7D3CB9B7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-7032r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "33886586-D207-4A99-A2BD-8C47A0BCD21B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-7032r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A9F938E-5036-45F5-BDCF-7F4ACA3C8D3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-7082r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "3D8111B2-6BC2-4A28-AD2C-BED51E4B2F8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-7082r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED329DF-B77E-4B90-BB1C-164AB1FD62BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-8010r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "C79C92DD-BACE-4ABC-A3A5-D26D717479CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-8010r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39C2E3D6-6BB1-45CD-824F-A3A4E34A2A28" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-8011_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "C42309D9-61DF-4931-9E76-D1BD27EBACEF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-8011:-:*:*:*:*:*:*:*", + "matchCriteriaId": "121DD556-B0D8-4FBC-8BD5-13BBE1AAB00F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-8020r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "152279A1-76E9-4831-87AE-B76D2A36EEC1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-8020r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54BA938B-B003-4AED-AAA8-26998C97B69F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-8021_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "1AC3DB82-A951-4D3B-B761-F114F5434363" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-8021:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42574A30-7AE1-4082-B261-654ECF1ED00F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-8080r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "5DD858C6-9758-4451-B251-94479F7CB9DC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-8080r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "24E312B9-D7D0-4352-9C0C-0FC55B833BA1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qne-8011r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "1132C45D-D230-4156-9D50-23C40C009D5A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qne-8011r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13FEA6E2-5C1C-4B68-BC20-A6687261E43B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnf-8010_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "8F7DF39D-9DD2-4A55-89B4-0A812EDE5CE3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnf-8010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "806B5C80-0D2C-46B8-9D74-4BA8640AEC14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnf-9010_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "0B2D7494-FBC2-4D0B-97D1-39008B813393" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnf-9010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3900880B-152E-4895-B4A6-EA4F155D18A3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-6012r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "68EEDA0B-81BD-4209-BFEF-758471B013D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-6012r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71818F35-643B-4193-A235-015779BF5F97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-6012r1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "00C9D01C-78BC-403E-914E-43B2B8A5EE6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-6012r1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1A0CF74-B5AF-4A9C-8983-BE8AEDAA10A7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-6022r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "7414D88D-41ED-4779-96FC-1291F4CF598B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-6022r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22330F60-8382-44ED-9A75-FD2770626695" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-6022r1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "D15D2DAC-DB5A-463D-89C9-D5A07C269180" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-6022r1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A4DEB1E-44EB-49C6-AAF5-D0E606EF084C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-6082r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "0F3D1546-22E1-4A8A-940C-2C74604EDEBD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-6082r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "166B6815-2F15-4C65-B053-AE462CE420A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-6082r1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "A6F0B100-7C3A-4F3B-90AB-E13FF51E18FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-6082r1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D2A6F5E-9F4B-408E-BA97-FF048525FAE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-7012r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "E9901F2F-7210-4677-9080-C0E2B0C275D2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-7012r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42EF82E5-1FC4-4FE6-A776-DC8EEC28593A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-7022r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "0C01617F-8637-45EA-9E01-67FBC065F5C0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-7022r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D239BBA-9403-4CDF-8268-C42F2211208E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-7032r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "0744F381-379D-41B6-9013-2857019CA07A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-7032r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB1D7ED9-F6C0-4B53-AAF3-511FF6729CC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-7082r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "99F5B14F-7010-41AD-A38C-DC9C4262DD28" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-7082r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85BAADDA-6EF3-434F-835E-DBB09264A001" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-8010r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "7C4CA4FF-64CC-4FA8-BF76-B72FE8E7BABE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-8010r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86AF76A6-8A87-45AD-9263-DFF8C307F427" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-8020r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "35F9B42E-310E-41CA-A448-989412FA75D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-8020r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8698083C-F763-450B-B826-5C1770DDEDA9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-8080r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "707B5CEC-77CA-4FC1-873C-067B6A1D06B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-8080r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE522EE9-E294-4E56-B7D8-9366028C40C1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-7012r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "8E420761-2B6B-4BBB-B360-F9AB4EDE3895" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-7012r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D9F0E6A-B369-48B8-8D57-F18093B46FD7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnp-6230_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "640FF15E-BB81-478D-B212-ADB594EF8886" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnp-6230:-:*:*:*:*:*:*:*", + "matchCriteriaId": "777557B7-F74D-466E-9312-2C5F22DD3502" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnp-6230h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "1E0418A5-A0CE-4E62-81FC-39FC64FD6536" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnp-6230h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B8CE79F-4208-42F7-A8FD-1559F664F90C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnp-6250_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "F6DA6235-CF0D-411E-AA0B-69BE485CED51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnp-6250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FAFF13B7-5BD7-4926-8CC1-36857FA8768F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnp-6250h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "BBABC3C3-03A3-4C04-93E5-BC2F48715FF3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnp-6250h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B0452F1-0192-47CE-8A12-7F2FB90477A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnp-6250r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "6C9D26B7-7E2A-4287-A56C-88D5BC0466DD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnp-6250r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12C762CA-1C10-4B70-BF69-4EC10076DC6B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnp-6320_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "34B7B608-EA49-499B-96EF-1F9158EB9C6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnp-6320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46AAF75C-C6B8-4872-A2DC-2F0827CCF368" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnp-6320h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "870F83FA-FC5D-49AA-9A1F-D095F908BE67" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnp-6320h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D02BC3A-3146-498F-8660-CC2E5F68DB33" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnp-6320hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "7A2D3318-573F-44EC-8427-A42405C8071B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnp-6320hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62F45A6E-A120-4BC2-AF4B-F7F8A071E414" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnp-6320r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "E50729DA-681C-4357-BD6C-63A3BE10F7DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnp-6320r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88F23926-CEE7-4D8A-AE32-A1F47CDB0F37" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-6012r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "D6F9AB1F-7FFC-4C85-AFC0-30177E6C9F99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-6012r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B38BFB-705B-437D-8E04-F827C9B1170C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-6012r1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "F875E9C0-218C-4055-A3EF-ECD11800A7EB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-6012r1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9E8666-8955-46FB-AB85-3A51722A249C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-6022r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "2D40D704-72EE-4B59-98BD-21F0ACFB400B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-6022r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1110E035-C2DE-4B3B-8F76-787566697250" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-6022r1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "BF439E40-0E65-4B3E-8040-BFA4C45F5A92" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-6022r1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50709B35-5C7A-4ADC-9645-C8BC52DE9953" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-6082r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "C9EE68FB-E60E-4729-ABD0-850B062A7035" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-6082r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E47B0D8F-06B2-4D37-A6AA-B2D10D83FC66" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-6082r1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "714B7E2F-F48F-40DC-AFFD-B1FBBDD19AF5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-6082r1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F691CE0-094F-47FA-8232-A66E5A6DE501" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-6010r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "5E31591A-65AB-4C3A-9D91-D75DA3F4756B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-6010r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECAF1AE7-B032-4D77-854C-7A3AEB18152C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-6020r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "7EF07665-EF3A-46CC-8829-A4A466B5E192" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-6020r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC07B597-04FF-4183-9FEA-C0C293C91DE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-6030r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "075A5BB8-6C1A-4158-95B4-AF843405C068" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-6030r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F99B081-BC57-47FD-BF6F-399E2CE3EE90" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-6032r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "B4CFAA01-7C46-45F9-8D2C-E120873A8FBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-6032r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A726C65-B971-4027-9CA0-1D83CA75AD75" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-6070r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "25AB3A8B-5E30-4D51-B879-0AE0B997BAAE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-6070r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B803977D-DF8D-4578-93C5-EBFA00E1B8F5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-6010r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "102C4460-1F42-4FE9-AF70-C828B971399D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-6010r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CD380D1-D467-4802-A694-6584A015AD30" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-6020r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "18178EA4-DB0C-4B1D-BC80-7B29EAE59BE2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-6020r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D76ECAA-9E47-4B52-A975-EC54FFC731E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-6030r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "47C3D714-9507-4BB2-AF07-832A9AE3D80F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-6030r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87BBCAF0-CF3B-4CD5-ABC9-A750AA7A7025" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-6032r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "E050CBC7-728A-48C9-B400-6550A828822F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-6032r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2BF0A76-A3B7-48D5-A84E-0307231DD0F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-6070r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "8EF7EFB7-E5CB-4669-B416-5B3E36DF13C4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-6070r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C27F293-ABD1-4DC1-A753-2F227593C980" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnp-6230rh_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "25BD1650-BB79-4919-AC99-CC951A02B391" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnp-6230rh:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B393B0E0-1393-4C2D-B12F-45F7980E86E8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-6010r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "55E66972-1EB5-4BE6-8951-FE173F59BB74" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-6010r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B50D74-9AA6-4F7D-BD50-89B7E2A0D553" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-6020r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "6BB85E1E-6845-4F97-831F-6F1E8545A7F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-6020r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E92BF2E-B32B-4F51-9E43-173612846845" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-6030r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "76A3D063-9E97-41D1-9C0A-A7C04EFD9301" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-6030r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6879EDC-E1B6-434E-92CC-1C79B70A61E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-6032r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "5985A422-D158-418C-8F3D-74A37412BE41" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-6032r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A128BAE-550C-4CD7-9758-BC4267A6B8B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-6070r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.14", + "matchCriteriaId": "037844A2-38F1-4C5C-A5B2-6C112E736737" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-6070r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F209535-3EA9-4E88-A99E-9EDFF7179976" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-7022r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "8A3A68B3-C34E-4A5C-81F0-28DC64C6E55D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-7022r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF76029A-D92E-41FE-AD95-C974927A1B8F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-7032r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "DE8E7336-728A-48DB-AE19-DC13B34A5281" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-7032r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0BA1CA22-244E-4AEB-9BA5-85280158F13F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-7082r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "670EEBE4-3697-42DD-A0DF-FE2B27D77117" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-7082r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8F89EF8-E41C-433F-8162-D4936BBB67AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-8010r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "435B651F-67B4-49C5-B5D1-54122FC2F832" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-8010r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A142924-E525-4397-92D4-549FDE2BE9A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-8020r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "710B1F8F-95A3-48FD-B0C1-61ABEFFF348B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-8020r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3985E148-2104-493B-9DC1-F8B5C547B71A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-8080r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "1523A330-59A0-482F-ADA8-3C3594173A9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-8080r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "975B6599-FF41-484D-B607-AEF6E8181783" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-7010r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "EB65E98D-09C9-4274-A2D7-7FF85334E66B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-7010r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61E26B38-C38B-4E95-A0A1-8891328E2B2E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-7020r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "6CCFEEC9-7F56-4CC2-B798-D5E65367DCCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-7020r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E81AC2F1-80FF-4459-98EF-395CCB2A7CAB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-7030r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "73F8BB27-ADC7-4618-B15B-9BBA9C878D0C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-7030r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E82BC5A1-DA1B-4ADF-A5BC-5AC8EBE7E8A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-7080r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "E5B8DECE-AF85-4B90-BB8D-F5415F7EFCDD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-7080r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E59456CF-E4A2-431D-B585-DED37EED2AD2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnd-8030r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "F7D63352-92A8-4B6F-A6C7-E8DF3F579C2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnd-8030r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79362DF5-C736-49D4-865F-0B40EB1A2A37" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qne-7088rv_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "F70A561A-C4CC-4414-850B-272E8FD9A560" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qne-7088rv:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2233C8A-B99A-4C6D-B291-65AE22F29F03" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qne-7080rvw_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "B8673477-2E34-4667-8350-B5537BB501B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qne-7080rvw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DDFD31D-7A8B-4ADB-9C11-B406BD72AD92" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qne-8021r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "514F40C2-E4EC-4F79-8EE8-BF8A9F85D33B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qne-8021r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB0CFA75-17DB-4EDE-81B7-ADC14DB21631" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-7020r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "7556BD6D-315C-4613-9FCE-9237D6F837E6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-7020r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B811065-62A2-4F3F-9538-2D22F8923840" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-7030r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "2014A293-B9BC-4B83-9764-50806420A608" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-7030r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D8BCBC7-4A16-4733-869E-64305B7B1621" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-7080r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "559F9DEF-D6FE-4271-87E9-16E4C18286BA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-7080r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF1E94C3-5C8E-4679-96BC-66FB610640D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qno-8030r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "4B2EB219-7262-46B5-8B35-C427BDD1B353" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qno-8030r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE2F7E95-3EF0-4DAD-9CF1-2F5F3AA4778F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-7010r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "13BFAAC5-DABD-45D9-BCDD-079D07B09E8B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-7010r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B70BDCA2-419E-41DA-A779-9630A1CD3A30" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-7020r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "930B955B-C948-441E-A1AF-DBE11E458799" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-7020r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D112016-1B23-458C-9F00-96D387EFEA73" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-7030r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "D272B0A5-D82A-4CC9-A3A8-0971AD5D7831" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-7030r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18AAEF39-5101-4E43-946F-1D2E29BDC823" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-7080r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "34292026-25A5-48F1-88B2-5DC0DE455D78" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-7080r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A29E1CB-BF61-4493-BE4E-ECFD737B1549" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hanwhavision:qnv-8030r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.05", + "matchCriteriaId": "660BABBA-D743-4E96-AB3E-E36FCF4AE2AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hanwhavision:qnv-8030r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C364674-534A-4FDA-B9B7-1491FA0F5BA6" + } + ] + } + ] + } + ], "references": [ { "url": "https://hanwhavisionamerica.com/download/50042/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.hanwhavision.com/wp-content/uploads/2023/04/Camera-Vulnerability-Report.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32684.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32684.json new file mode 100644 index 00000000000..34d7036d0c1 --- /dev/null +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32684.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-32684", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-05-30T18:15:10.137", + "lastModified": "2023-05-30T18:52:32.890", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Lima launches Linux virtual machines, typically on macOS, for running containerd. Prior to version 0.16.0, a virtual machine instance with a malicious disk image could read a single file on the host filesystem, even when no filesystem is mounted from the host. The official templates of Lima and the well-known third party products (Colima, Rancher Desktop, and Finch) are unlikely to be affected by this issue. To exploit this issue, the attacker has to embed the target file path (an absolute or a relative path from the instance directory) in a malicious disk image, as the qcow2 (or vmdk) backing file path string. As Lima refuses to run as the root, it is practically impossible for the attacker to read the entire host disk via `/dev/rdiskN`. Also, practically, the attacker cannot read at least the first 512 bytes (MBR) of the target file. The issue has been patched in Lima in version 0.16.0 by prohibiting using a backing file path in the VM base image." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/lima-vm/lima/commit/01dbd4d9cabe692afa4517be3995771f0ebb38a5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/lima-vm/lima/releases/tag/v0.16.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/lima-vm/lima/security/advisories/GHSA-f7qw-jj9c-rpq9", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32689.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32689.json new file mode 100644 index 00000000000..29336e466a5 --- /dev/null +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32689.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-32689", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-05-30T18:15:10.227", + "lastModified": "2023-05-30T18:52:32.890", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Versions prior to 5.4.4 and 6.1.1 are vulnerable to a phishing attack vulnerability that involves a user uploading malicious files. A malicious user could upload an HTML file to Parse Server via its public API. That HTML file would then be accessible at the internet domain at which Parse Server is hosted. The URL of the the uploaded HTML could be shared for phishing attacks. The HTML page may seem legitimate because it is served under the internet domain where Parse Server is hosted, which may be the same as a company's official website domain.\n\nAn additional security issue arises when the Parse JavaScript SDK is used. The SDK stores sessions in the internet browser's local storage, which usually restricts data access depending on the internet domain. A malicious HTML file could contain a script that retrieves the user's session token from local storage and then share it with the attacker.\n\nThe fix included in versions 5.4.4 and 6.1.1 adds a new Parse Server option `fileUpload.fileExtensions` to restrict file upload on Parse Server by file extension. It is recommended to restrict file upload for HTML file extensions, which this fix disables by default. If an app requires upload of files with HTML file extensions, the option can be set to `['.*']` or another custom value to override the default." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/parse-community/parse-server/pull/8537", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/parse-community/parse-server/pull/8538", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-9prm-jqwx-45x9", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32696.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32696.json new file mode 100644 index 00000000000..203552e0065 --- /dev/null +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32696.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-32696", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-05-30T19:15:10.023", + "lastModified": "2023-05-30T19:15:10.023", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "CKAN is an open-source data management system for powering data hubs and data portals. Prior to versions 2.9.9 and 2.10.1, the `ckan` user (equivalent to www-data) owned code and configuration files in the docker container and the `ckan` user had the permissions to use sudo. These issues allowed for code execution or privilege escalation if an arbitrary file write bug was available. Versions 2.9.9, 2.9.9-dev, 2.10.1, and 2.10.1-dev contain a patch.\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ckan/ckan-docker-base/commit/5483c46ce9b518a4e1b626ef7032cce2c1d75c7d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ckan/ckan-docker-base/security/advisories/GHSA-c74x-xfvr-x5wg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32699.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32699.json new file mode 100644 index 00000000000..034daf5aeb0 --- /dev/null +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32699.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-32699", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-05-30T19:15:10.103", + "lastModified": "2023-05-30T19:15:10.103", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "MeterSphere is an open source continuous testing platform. Version 2.9.1 and prior are vulnerable to denial of service. ?The `checkUserPassword` method is used to check whether the password provided by the user matches the password saved in the database, and the `CodingUtil.md5` method is used to encrypt the original password with MD5 to ensure that the password will not be saved in plain text when it is stored. If a user submits a very long password when logging in, the system will be forced to execute the long password MD5 encryption process, causing the server CPU and memory to be exhausted, thereby causing a denial of service attack on the server. This issue is fixed in version 2.10.0-lts with a maximum password length." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/metersphere/metersphere/commit/c59e381d368990214813085a1a4877c5ef865411", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/metersphere/metersphere/security/advisories/GHSA-qffq-8gf8-mhq7", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33235.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33235.json index 0eec24fa6f3..f0c054301a2 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33235.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33235.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33235", "sourceIdentifier": "psirt@moxa.com", "published": "2023-05-22T06:15:11.020", - "lastModified": "2023-05-22T10:56:50.933", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-30T19:43:02.460", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@moxa.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + }, { "source": "psirt@moxa.com", "type": "Secondary", @@ -46,10 +76,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moxa:mxsecurity:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FF59E08E-83DD-4973-89D0-6C438C8FDB4C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.moxa.com/en/support/product-support/security-advisory/mxsecurity-command-injection-and-hardcoded-credential-vulnerabilities", - "source": "psirt@moxa.com" + "source": "psirt@moxa.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33236.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33236.json index b471ad1f7c7..c0612adac81 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33236.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33236.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33236", "sourceIdentifier": "psirt@moxa.com", "published": "2023-05-22T07:15:09.257", - "lastModified": "2023-05-22T10:56:50.933", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-30T19:29:08.573", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "psirt@moxa.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + }, { "source": "psirt@moxa.com", "type": "Secondary", @@ -46,10 +76,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moxa:mxsecurity:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FF59E08E-83DD-4973-89D0-6C438C8FDB4C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.moxa.com/en/support/product-support/security-advisory/mxsecurity-command-injection-and-hardcoded-credential-vulnerabilities", - "source": "psirt@moxa.com" + "source": "psirt@moxa.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33255.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33255.json index ae480286890..8ec0153fb85 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33255.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33255.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33255", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-26T20:15:49.577", - "lastModified": "2023-05-28T02:28:04.970", + "lastModified": "2023-05-30T19:15:10.170", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -12,6 +12,14 @@ ], "metrics": {}, "references": [ + { + "url": "http://packetstormsecurity.com/files/172644/Papaya-Medical-Viewer-1.0-Cross-Site-Scripting.html", + "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2023/May/21", + "source": "cve@mitre.org" + }, { "url": "https://schutzwerk.com", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-336xx/CVE-2023-33656.json b/CVE-2023/CVE-2023-336xx/CVE-2023-33656.json new file mode 100644 index 00000000000..b751229bad9 --- /dev/null +++ b/CVE-2023/CVE-2023-336xx/CVE-2023-33656.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-33656", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-30T18:15:10.383", + "lastModified": "2023-05-30T18:52:32.890", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A memory leak vulnerability exists in NanoMQ 0.17.2. The vulnerability is located in the file message.c. An attacker could exploit this vulnerability to cause a denial of service attack by causing the program to consume all available memory resources." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/emqx/nanomq", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/emqx/nanomq/issues/1164", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/emqx/nanomq/issues/1165#issuecomment-1515667127", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-339xx/CVE-2023-33973.json b/CVE-2023/CVE-2023-339xx/CVE-2023-33973.json index 3a27778707b..448549d0b14 100644 --- a/CVE-2023/CVE-2023-339xx/CVE-2023-33973.json +++ b/CVE-2023/CVE-2023-339xx/CVE-2023-33973.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33973", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-30T17:15:10.127", - "lastModified": "2023-05-30T17:15:10.127", - "vulnStatus": "Received", + "lastModified": "2023-05-30T18:52:32.890", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-339xx/CVE-2023-33974.json b/CVE-2023/CVE-2023-339xx/CVE-2023-33974.json index b6efb294084..7f32e57fa76 100644 --- a/CVE-2023/CVE-2023-339xx/CVE-2023-33974.json +++ b/CVE-2023/CVE-2023-339xx/CVE-2023-33974.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33974", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-30T17:15:10.200", - "lastModified": "2023-05-30T17:15:10.200", - "vulnStatus": "Received", + "lastModified": "2023-05-30T18:52:32.890", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-339xx/CVE-2023-33975.json b/CVE-2023/CVE-2023-339xx/CVE-2023-33975.json new file mode 100644 index 00000000000..7b148b13864 --- /dev/null +++ b/CVE-2023/CVE-2023-339xx/CVE-2023-33975.json @@ -0,0 +1,87 @@ +{ + "id": "CVE-2023-33975", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-05-30T18:15:10.433", + "lastModified": "2023-05-30T18:52:32.890", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. In version 2023.01 and prior, an attacker can send a crafted frame to the device resulting in an out of bounds write in the packet buffer. The overflow can be used to corrupt other packets and the allocator metadata. Corrupting a pointer will easily lead to denial of service. While carefully manipulating the allocator metadata gives an attacker the possibility to write data to arbitrary locations and thus execute arbitrary code. This issue is fixed in pull request 19680. As a workaround, disable support for fragmented IP datagrams." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L320", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L388", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L463", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L467", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/frag/rb/gnrc_sixlowpan_frag_rb.c#L480", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/RIOT-OS/RIOT/commit/1aeb90ee5555ae78b567a6365ae4ab71bfd1404b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/RIOT-OS/RIOT/pull/19680", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-f6ff-g7mh-58q4", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 37b9b57a32f..3191c4be2f2 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-30T18:00:30.495338+00:00 +2023-05-30T20:00:26.920710+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-30T17:48:39.400000+00:00 +2023-05-30T19:43:02.460000+00:00 ``` ### Last Data Feed Release @@ -29,60 +29,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -216374 +216384 ``` ### CVEs added in the last Commit -Recently added CVEs: `16` +Recently added CVEs: `10` -* [CVE-2022-43485](CVE-2022/CVE-2022-434xx/CVE-2022-43485.json) (`2023-05-30T17:15:09.573`) -* [CVE-2022-46361](CVE-2022/CVE-2022-463xx/CVE-2022-46361.json) (`2023-05-30T17:15:09.737`) -* [CVE-2022-4240](CVE-2022/CVE-2022-42xx/CVE-2022-4240.json) (`2023-05-30T17:15:09.810`) -* [CVE-2023-20884](CVE-2023/CVE-2023-208xx/CVE-2023-20884.json) (`2023-05-30T16:15:09.390`) -* [CVE-2023-24568](CVE-2023/CVE-2023-245xx/CVE-2023-24568.json) (`2023-05-30T16:15:09.533`) -* [CVE-2023-24817](CVE-2023/CVE-2023-248xx/CVE-2023-24817.json) (`2023-05-30T16:15:09.607`) -* [CVE-2023-24825](CVE-2023/CVE-2023-248xx/CVE-2023-24825.json) (`2023-05-30T16:15:09.687`) -* [CVE-2023-28079](CVE-2023/CVE-2023-280xx/CVE-2023-28079.json) (`2023-05-30T16:15:09.763`) -* [CVE-2023-28080](CVE-2023/CVE-2023-280xx/CVE-2023-28080.json) (`2023-05-30T16:15:09.837`) -* [CVE-2023-32448](CVE-2023/CVE-2023-324xx/CVE-2023-32448.json) (`2023-05-30T16:15:09.937`) -* [CVE-2023-23754](CVE-2023/CVE-2023-237xx/CVE-2023-23754.json) (`2023-05-30T17:15:09.887`) -* [CVE-2023-23755](CVE-2023/CVE-2023-237xx/CVE-2023-23755.json) (`2023-05-30T17:15:09.937`) -* [CVE-2023-24826](CVE-2023/CVE-2023-248xx/CVE-2023-24826.json) (`2023-05-30T17:15:09.983`) -* [CVE-2023-29737](CVE-2023/CVE-2023-297xx/CVE-2023-29737.json) (`2023-05-30T17:15:10.067`) -* [CVE-2023-33973](CVE-2023/CVE-2023-339xx/CVE-2023-33973.json) (`2023-05-30T17:15:10.127`) -* [CVE-2023-33974](CVE-2023/CVE-2023-339xx/CVE-2023-33974.json) (`2023-05-30T17:15:10.200`) +* [CVE-2018-8661](CVE-2018/CVE-2018-86xx/CVE-2018-8661.json) (`2023-05-30T18:15:09.797`) +* [CVE-2023-2994](CVE-2023/CVE-2023-29xx/CVE-2023-2994.json) (`2023-05-30T18:15:10.077`) +* [CVE-2023-2968](CVE-2023/CVE-2023-29xx/CVE-2023-2968.json) (`2023-05-30T18:15:09.997`) +* [CVE-2023-32684](CVE-2023/CVE-2023-326xx/CVE-2023-32684.json) (`2023-05-30T18:15:10.137`) +* [CVE-2023-32689](CVE-2023/CVE-2023-326xx/CVE-2023-32689.json) (`2023-05-30T18:15:10.227`) +* [CVE-2023-33656](CVE-2023/CVE-2023-336xx/CVE-2023-33656.json) (`2023-05-30T18:15:10.383`) +* [CVE-2023-33975](CVE-2023/CVE-2023-339xx/CVE-2023-33975.json) (`2023-05-30T18:15:10.433`) +* [CVE-2023-1711](CVE-2023/CVE-2023-17xx/CVE-2023-1711.json) (`2023-05-30T19:15:09.753`) +* [CVE-2023-32696](CVE-2023/CVE-2023-326xx/CVE-2023-32696.json) (`2023-05-30T19:15:10.023`) +* [CVE-2023-32699](CVE-2023/CVE-2023-326xx/CVE-2023-32699.json) (`2023-05-30T19:15:10.103`) ### CVEs modified in the last Commit -Recently modified CVEs: `51` +Recently modified CVEs: `30` -* [CVE-2023-33361](CVE-2023/CVE-2023-333xx/CVE-2023-33361.json) (`2023-05-30T16:54:58.213`) -* [CVE-2023-33359](CVE-2023/CVE-2023-333xx/CVE-2023-33359.json) (`2023-05-30T16:55:27.047`) -* [CVE-2023-30469](CVE-2023/CVE-2023-304xx/CVE-2023-30469.json) (`2023-05-30T16:56:04.817`) -* [CVE-2023-28394](CVE-2023/CVE-2023-283xx/CVE-2023-28394.json) (`2023-05-30T16:56:27.847`) -* [CVE-2023-28392](CVE-2023/CVE-2023-283xx/CVE-2023-28392.json) (`2023-05-30T16:58:18.333`) -* [CVE-2023-27388](CVE-2023/CVE-2023-273xx/CVE-2023-27388.json) (`2023-05-30T16:58:57.970`) -* [CVE-2023-27387](CVE-2023/CVE-2023-273xx/CVE-2023-27387.json) (`2023-05-30T17:01:15.290`) -* [CVE-2023-33937](CVE-2023/CVE-2023-339xx/CVE-2023-33937.json) (`2023-05-30T17:03:17.217`) -* [CVE-2023-2859](CVE-2023/CVE-2023-28xx/CVE-2023-2859.json) (`2023-05-30T17:11:43.767`) -* [CVE-2023-28755](CVE-2023/CVE-2023-287xx/CVE-2023-28755.json) (`2023-05-30T17:17:09.653`) -* [CVE-2023-28756](CVE-2023/CVE-2023-287xx/CVE-2023-28756.json) (`2023-05-30T17:17:15.007`) -* [CVE-2023-26116](CVE-2023/CVE-2023-261xx/CVE-2023-26116.json) (`2023-05-30T17:18:44.267`) -* [CVE-2023-26118](CVE-2023/CVE-2023-261xx/CVE-2023-26118.json) (`2023-05-30T17:20:32.760`) -* [CVE-2023-26117](CVE-2023/CVE-2023-261xx/CVE-2023-26117.json) (`2023-05-30T17:20:47.480`) -* [CVE-2023-31860](CVE-2023/CVE-2023-318xx/CVE-2023-31860.json) (`2023-05-30T17:30:36.053`) -* [CVE-2023-31752](CVE-2023/CVE-2023-317xx/CVE-2023-31752.json) (`2023-05-30T17:32:22.760`) -* [CVE-2023-31517](CVE-2023/CVE-2023-315xx/CVE-2023-31517.json) (`2023-05-30T17:33:21.957`) -* [CVE-2023-23306](CVE-2023/CVE-2023-233xx/CVE-2023-23306.json) (`2023-05-30T17:34:08.577`) -* [CVE-2023-23305](CVE-2023/CVE-2023-233xx/CVE-2023-23305.json) (`2023-05-30T17:35:06.420`) -* [CVE-2023-23304](CVE-2023/CVE-2023-233xx/CVE-2023-23304.json) (`2023-05-30T17:36:35.190`) -* [CVE-2023-23303](CVE-2023/CVE-2023-233xx/CVE-2023-23303.json) (`2023-05-30T17:37:13.397`) -* [CVE-2023-23302](CVE-2023/CVE-2023-233xx/CVE-2023-23302.json) (`2023-05-30T17:37:52.530`) -* [CVE-2023-23301](CVE-2023/CVE-2023-233xx/CVE-2023-23301.json) (`2023-05-30T17:38:28.907`) -* [CVE-2023-25028](CVE-2023/CVE-2023-250xx/CVE-2023-25028.json) (`2023-05-30T17:44:06.157`) -* [CVE-2023-2494](CVE-2023/CVE-2023-24xx/CVE-2023-2494.json) (`2023-05-30T17:48:39.400`) +* [CVE-2022-4945](CVE-2022/CVE-2022-49xx/CVE-2022-4945.json) (`2023-05-30T18:05:33.233`) +* [CVE-2022-46658](CVE-2022/CVE-2022-466xx/CVE-2022-46658.json) (`2023-05-30T18:17:14.057`) +* [CVE-2022-43485](CVE-2022/CVE-2022-434xx/CVE-2022-43485.json) (`2023-05-30T18:52:32.890`) +* [CVE-2022-46361](CVE-2022/CVE-2022-463xx/CVE-2022-46361.json) (`2023-05-30T18:52:32.890`) +* [CVE-2022-4240](CVE-2022/CVE-2022-42xx/CVE-2022-4240.json) (`2023-05-30T18:52:32.890`) +* [CVE-2023-2650](CVE-2023/CVE-2023-26xx/CVE-2023-2650.json) (`2023-05-30T18:15:09.927`) +* [CVE-2023-27068](CVE-2023/CVE-2023-270xx/CVE-2023-27068.json) (`2023-05-30T18:27:39.760`) +* [CVE-2023-29919](CVE-2023/CVE-2023-299xx/CVE-2023-29919.json) (`2023-05-30T18:35:16.013`) +* [CVE-2023-31995](CVE-2023/CVE-2023-319xx/CVE-2023-31995.json) (`2023-05-30T18:45:24.693`) +* [CVE-2023-31664](CVE-2023/CVE-2023-316xx/CVE-2023-31664.json) (`2023-05-30T18:46:57.883`) +* [CVE-2023-23754](CVE-2023/CVE-2023-237xx/CVE-2023-23754.json) (`2023-05-30T18:52:32.890`) +* [CVE-2023-23755](CVE-2023/CVE-2023-237xx/CVE-2023-23755.json) (`2023-05-30T18:52:32.890`) +* [CVE-2023-24826](CVE-2023/CVE-2023-248xx/CVE-2023-24826.json) (`2023-05-30T18:52:32.890`) +* [CVE-2023-29737](CVE-2023/CVE-2023-297xx/CVE-2023-29737.json) (`2023-05-30T18:52:32.890`) +* [CVE-2023-33973](CVE-2023/CVE-2023-339xx/CVE-2023-33973.json) (`2023-05-30T18:52:32.890`) +* [CVE-2023-33974](CVE-2023/CVE-2023-339xx/CVE-2023-33974.json) (`2023-05-30T18:52:32.890`) +* [CVE-2023-31826](CVE-2023/CVE-2023-318xx/CVE-2023-31826.json) (`2023-05-30T18:55:20.623`) +* [CVE-2023-31814](CVE-2023/CVE-2023-318xx/CVE-2023-31814.json) (`2023-05-30T19:00:27.487`) +* [CVE-2023-31285](CVE-2023/CVE-2023-312xx/CVE-2023-31285.json) (`2023-05-30T19:15:09.833`) +* [CVE-2023-31286](CVE-2023/CVE-2023-312xx/CVE-2023-31286.json) (`2023-05-30T19:15:09.897`) +* [CVE-2023-31287](CVE-2023/CVE-2023-312xx/CVE-2023-31287.json) (`2023-05-30T19:15:09.967`) +* [CVE-2023-33255](CVE-2023/CVE-2023-332xx/CVE-2023-33255.json) (`2023-05-30T19:15:10.170`) +* [CVE-2023-31740](CVE-2023/CVE-2023-317xx/CVE-2023-31740.json) (`2023-05-30T19:17:44.447`) +* [CVE-2023-33236](CVE-2023/CVE-2023-332xx/CVE-2023-33236.json) (`2023-05-30T19:29:08.573`) +* [CVE-2023-33235](CVE-2023/CVE-2023-332xx/CVE-2023-33235.json) (`2023-05-30T19:43:02.460`) ## Download and Usage