From 8200aaabba99d2ab0d17234cc2738c3002dc136f Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 22 Aug 2023 18:00:46 +0000 Subject: [PATCH] Auto-Update: 2023-08-22T18:00:42.927137+00:00 --- CVE-2020/CVE-2020-260xx/CVE-2020-26037.json | 75 +- CVE-2022/CVE-2022-298xx/CVE-2022-29871.json | 3106 ++++++++++++++++++- CVE-2022/CVE-2022-47xx/CVE-2022-4782.json | 53 +- CVE-2023/CVE-2023-00xx/CVE-2023-0058.json | 53 +- CVE-2023/CVE-2023-05xx/CVE-2023-0551.json | 52 +- CVE-2023/CVE-2023-19xx/CVE-2023-1977.json | 53 +- CVE-2023/CVE-2023-21xx/CVE-2023-2122.json | 53 +- CVE-2023/CVE-2023-21xx/CVE-2023-2123.json | 58 +- CVE-2023/CVE-2023-229xx/CVE-2023-22955.json | 234 +- CVE-2023/CVE-2023-229xx/CVE-2023-22956.json | 235 +- CVE-2023/CVE-2023-229xx/CVE-2023-22957.json | 236 +- CVE-2023/CVE-2023-22xx/CVE-2023-2225.json | 53 +- CVE-2023/CVE-2023-22xx/CVE-2023-2254.json | 65 +- CVE-2023/CVE-2023-22xx/CVE-2023-2271.json | 53 +- CVE-2023/CVE-2023-22xx/CVE-2023-2272.json | 53 +- CVE-2023/CVE-2023-23xx/CVE-2023-2312.json | 92 +- CVE-2023/CVE-2023-307xx/CVE-2023-30779.json | 47 +- CVE-2023/CVE-2023-307xx/CVE-2023-30786.json | 47 +- CVE-2023/CVE-2023-308xx/CVE-2023-30871.json | 47 +- CVE-2023/CVE-2023-310xx/CVE-2023-31041.json | 83 +- CVE-2023/CVE-2023-320xx/CVE-2023-32006.json | 109 +- CVE-2023/CVE-2023-32xx/CVE-2023-3259.json | 657 +++- CVE-2023/CVE-2023-32xx/CVE-2023-3260.json | 673 +++- CVE-2023/CVE-2023-32xx/CVE-2023-3261.json | 673 +++- CVE-2023/CVE-2023-32xx/CVE-2023-3262.json | 657 +++- CVE-2023/CVE-2023-32xx/CVE-2023-3263.json | 657 +++- CVE-2023/CVE-2023-32xx/CVE-2023-3264.json | 673 +++- CVE-2023/CVE-2023-32xx/CVE-2023-3265.json | 57 +- CVE-2023/CVE-2023-32xx/CVE-2023-3266.json | 57 +- CVE-2023/CVE-2023-32xx/CVE-2023-3267.json | 57 +- CVE-2023/CVE-2023-394xx/CVE-2023-39438.json | 59 +- CVE-2023/CVE-2023-395xx/CVE-2023-39507.json | 64 +- CVE-2023/CVE-2023-395xx/CVE-2023-39534.json | 100 +- CVE-2023/CVE-2023-396xx/CVE-2023-39659.json | 72 +- CVE-2023/CVE-2023-396xx/CVE-2023-39661.json | 66 +- CVE-2023/CVE-2023-396xx/CVE-2023-39662.json | 66 +- CVE-2023/CVE-2023-399xx/CVE-2023-39945.json | 109 +- CVE-2023/CVE-2023-402xx/CVE-2023-40274.json | 72 +- CVE-2023/CVE-2023-402xx/CVE-2023-40296.json | 66 +- CVE-2023/CVE-2023-42xx/CVE-2023-4241.json | 57 +- CVE-2023/CVE-2023-43xx/CVE-2023-4345.json | 63 +- CVE-2023/CVE-2023-43xx/CVE-2023-4366.json | 106 +- CVE-2023/CVE-2023-43xx/CVE-2023-4367.json | 105 +- CVE-2023/CVE-2023-43xx/CVE-2023-4369.json | 82 +- CVE-2023/CVE-2023-43xx/CVE-2023-4374.json | 37 +- CVE-2023/CVE-2023-43xx/CVE-2023-4381.json | 67 +- README.md | 55 +- 47 files changed, 10032 insertions(+), 232 deletions(-) diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26037.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26037.json index 76f7163479e..d2076fe4ba4 100644 --- a/CVE-2020/CVE-2020-260xx/CVE-2020-26037.json +++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26037.json @@ -2,27 +2,90 @@ "id": "CVE-2020-26037", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-16T13:15:10.413", - "lastModified": "2023-08-16T15:17:05.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:39:28.080", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Directory Traversal vulnerability in Server functionalty in Even Balance Punkbuster version 1.902 before 1.905 allows remote attackers to execute arbitrary code." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:evenbalance:punkbuster:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.902", + "versionEndExcluding": "1.905", + "matchCriteriaId": "0F12BD38-FF07-484B-A022-369E21AA055A" + } + ] + } + ] + } + ], "references": [ { "url": "http://even.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "http://punkbuster.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://medium.com/@prizmant/hacking-punkbuster-e22e6cf2f36e", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-298xx/CVE-2022-29871.json b/CVE-2022/CVE-2022-298xx/CVE-2022-29871.json index 3a770de2c0b..3ee634ad360 100644 --- a/CVE-2022/CVE-2022-298xx/CVE-2022-29871.json +++ b/CVE-2022/CVE-2022-298xx/CVE-2022-29871.json @@ -2,8 +2,8 @@ "id": "CVE-2022-29871", "sourceIdentifier": "secure@intel.com", "published": "2023-08-11T03:15:12.350", - "lastModified": "2023-08-11T03:44:51.127", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:15:51.420", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,3090 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.12.94", + "matchCriteriaId": "11BC4447-C51A-4FE3-9961-44C003DD5E87" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:c232:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C3CC679-8CEE-41F9-8DD0-4B5B02D7BBF6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:c236:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D02651A-0F34-476D-B049-72C872464FC8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:c420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69ECA4C4-3A03-4C07-9461-63C84221CD80" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:c422:-:*:*:*:*:*:*:*", + "matchCriteriaId": "095F8957-9499-475C-8D68-A07A1140A4DE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:cm236:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAA5A85C-17B0-490F-853F-3451D2406F47" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:cm238:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1CA8160-27AD-4390-AF99-82CF31DDE94F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E20F674C-6522-42E4-85D9-B4C39A882D20" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.8.94", + "matchCriteriaId": "136B04D8-2CB6-47B0-9D6E-891DF57DA35B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4A62BA8-3AE3-4339-97D3-4768A122C71C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A2CDBC2-2B45-4E22-845A-EB8415D4C56D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25227F52-7398-4E68-A973-B9177886BE0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B230FB82-C498-4118-97D3-3835CB713E87" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*", + "matchCriteriaId": "790A7B55-AD96-4B1C-A31A-C6778BFD5CC5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EDCD661-394A-431F-84C2-0252ABD6F1B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09271283-1681-4EB4-8BD3-DE01674D4D19" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B23A6C6-89CF-42CA-A3D0-E17EB8104BBE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2715B64C-204D-4243-944E-434FDA366AA9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:hm170:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6CEAEB8-C0DD-4886-8EBB-D244A87338C7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:hm175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDA12EE0-6877-431B-8CC9-9C7576444E64" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73A05885-8AFD-4FFA-BE18-9CE24A1427B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7BB0694-7F15-4784-97AA-9E9783B3702C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6E4C9D1-C1E8-43E1-88B8-76637A991EB1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "64E68EB4-7634-42AB-8DCD-8C87C86F78E1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:qm170:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49495821-5D75-49F0-B2BB-2F73441731D1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:qm175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "634DFA37-FE38-423B-92FA-01AAB0B389E3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E20F674C-6522-42E4-85D9-B4C39A882D20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6E0469E-FFC6-46BF-BB03-34326D1DBE19" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "955612CC-223F-47C0-9D75-D71A39E61A3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.0.93", + "matchCriteriaId": "34D35636-BCC5-4C47-88E3-B8681CD79440" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0829C549-51C2-4029-9623-51D0C5470FBB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6CC7A911-2CFA-44B3-9B5D-824C02A92D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7FDE41F-FF2A-42F0-AF4D-F57A28E377F4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4AB420EA-D647-4272-8A96-2A09E70FAEAE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6910BDD0-4968-45AE-AD19-3A1206F5D068" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14C91CFB-C318-4F06-9A01-DCCEE2E901B4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5C0F89F-0C58-44B8-A02C-50A97B086659" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:cm246:-:*:*:*:*:*:*:*", + "matchCriteriaId": "246F7FE9-0B21-4947-B6C2-6CA2DB1D7817" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25227F52-7398-4E68-A973-B9177886BE0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B230FB82-C498-4118-97D3-3835CB713E87" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*", + "matchCriteriaId": "790A7B55-AD96-4B1C-A31A-C6778BFD5CC5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EDCD661-394A-431F-84C2-0252ABD6F1B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DD64A3C-6925-4715-9D55-F1FC8AA0BB95" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D7D83701-E7FF-41D3-ACC6-C78519E34FBD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:hm370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1893AF0C-A12E-4DDE-88D6-44A4318176D2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D376C32-99BE-4DF4-A63D-2156D10EEA73" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CD6D64A-BC68-458E-810B-9EEDFD35817A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:qm370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "205568C6-2BBB-4B1B-A609-5448F8B7E22E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD09C370-3A22-4AFD-89D7-C35B152C4DE6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9379A170-4752-49F2-941D-75D88D385966" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.1.70", + "matchCriteriaId": "55DE4BD2-14AA-44EB-A031-644934344F67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.5.0", + "versionEndExcluding": "14.5.50", + "matchCriteriaId": "180F0BC8-3FBB-4ADE-8679-169E4C308D00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFB47F1D-AE3D-4F0E-AEFE-879140B47DD5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE191F8B-AC43-431E-87F7-46E2EF211D27" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C530D5AA-7480-45A7-BF06-45BF95B96B22" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D7E83B0-4902-40CF-9B24-3358846186E8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:hm470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9AC90E6-DF0B-4370-825E-41E4986D30CE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61E425A8-F0F9-4C38-B199-0A410F0D0270" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F945B90-257C-4DCB-9CB3-F34C6F6529D3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:qm480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D4ACE9D-B829-44BD-8124-30BD62E8F8B4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5AE97F1-0236-4305-BC0B-253160262125" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8621ECA8-A467-471E-A871-72EDD10BB2FF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wm490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AC3826E-7DA9-4A86-836F-7F3B32AEB3D2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D16ACC77-CE53-4897-BEF8-50CFE7AD56FE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.45", + "matchCriteriaId": "59579717-55D1-402C-870F-3BED480A32CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89231773-9D9B-434A-A6A3-8527C4F6FEBB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A85EA674-2537-4323-AEDA-FA356489E7DE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F85599DD-3F80-4EB0-9753-D24EDD8D76CC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:atom_x6214re:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D98929C-9560-40CF-8231-718B5BFF19EA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B3348F4-8E2B-42BE-9F3A-48DFF5CE0047" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:atom_x6414re:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1D7A0BC-7798-466E-B341-D371988FE6CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:atom_x6416re:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A8C0489-E31A-455A-AA64-3765074530F4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F068F4F-8CCD-4218-871C-BEABEB0DAB55" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7313975C-41A5-4657-8758-1C16F947BE4C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FBE4406-9979-4723-833C-176F051E6389" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:b560:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE930AA-59F7-43A7-9FF3-363CE72A6728" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:c252:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6E46116-6B73-4A65-A2AB-E238678B7E48" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:c256:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9F281EE-3F33-406A-8FA0-43B3AB6BC35B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2F55513-48F4-44EC-9293-2CA744FCE07B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51D52347-FA7F-4592-99E4-4C01D2833F35" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82EC9A22-4893-4770-A501-31D492DC7EC3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "744EC990-7849-4BC1-BC75-1D64693645A4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B949F28E-5C73-4222-973E-DC39325E9268" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*", + "matchCriteriaId": "132E32FD-4A52-43AF-9C0A-75F299B4C93F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7087FCA7-6D5C-45A5-B380-533915BC608A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85683891-11D4-47B1-834B-5E0380351E78" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03D778C7-F242-4A6A-9B62-A7C578D985FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*", + "matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*", + "matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D3162DD-BF40-4A58-8FC4-63B4455C0E51" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7A8BF58-1D33-484A-951C-808443912BE8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04CEC115-871B-4222-A3F8-6B1EE15E9A2C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FD0BD9D-F741-457D-9495-8BCC3707D098" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2935CEA-13CE-4F4C-84B1-0318FB6FE39A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3BB7241-F796-44A7-8171-B555A45FF852" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F967E7C-E56D-46B2-AEB8-1931FA324029" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D902C7F-DCE8-41ED-8E80-26DA251FBF36" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71C505E0-3548-49BD-9B53-2A588FF29144" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5E735023-A75C-48E3-AD6B-BB29CF95B17F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3826FEBA-0B2E-403D-9A6A-0DA02FEF9A2B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4080CDEF-3938-44D5-9737-6A9D72DB54B7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A77976A7-6C2D-4E0B-A28B-06A23EEA0D68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5600350-04CC-4481-AC47-9F98BEB9D258" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5A64D0A-D1C2-41B3-B51B-563263438CA8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B57F4250-80C8-4612-97F6-2702D3F7DF25" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AA180B4-0EB8-4884-A600-BFAEB64A0A58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27D79952-8946-488A-8BD8-6129D97A8E34" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "752081F5-AE8D-4004-B564-863840AC52E1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5375A75A-85AA-4119-9F6C-1AD9D2550F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE7B5E21-2796-4578-998F-B03E26277DE7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D31CA93-6F45-4BCE-B504-35F6494B864C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*", + "matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h510:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D67C6D6B-12F3-43A6-BB8D-DFE0B6483294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96F1DD9B-C078-41C5-88E0-DB7705E17742" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:hm570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D9BD5A1-AD1F-4770-87EE-7F1804BA87A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:hm570e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "242BA56E-E8D0-4851-AA71-FECB9E102F87" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C43D202-D661-4042-9F68-0FA7EE73CFEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29ECACD3-E10C-4773-B847-8C1C097C45FA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56C4EF86-84BF-48F4-88DE-8142A270D4A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7596F281-BA94-4239-8238-AA5EC804AE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A635B99E-A03F-488A-A01B-B390691EA03B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22EAE772-AFAC-4272-8129-B416B171490C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDB3841D-3872-42BD-B0FB-E3E61813CA63" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C5DC1B8F-3F6C-49D8-BF5F-54146DE3E83C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1A836B1-451E-4CEF-8A14-89FFB9289DD3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BC51285-B40A-4BEA-9CFF-F3BC01B5BA80" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638FA431-71EA-4668-AFF2-989A4994ED12" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44BCD8EB-D71A-4BD6-8D2D-AF2430F840C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:qm580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61AB83BE-01F0-412B-98E9-B766884BF249" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:qm580e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CDD634A-B6BA-452C-A6E0-18ADEFF81529" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:rm590e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1C4E46E-5828-4EE6-9A95-8F4FE56AC156" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:w580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE366EB3-BE96-4A01-9BD5-792B59163938" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wm590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4158B9A6-ACBE-4A62-AA2C-9790F73C4C3C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:z590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89563A0F-CE7A-41C5-A8C7-9FC2D40F000A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.1.27", + "matchCriteriaId": "E7317CB4-D0A7-4508-83AD-6C30CF407E96" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:b660:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2576527C-0218-491F-871E-07A60A5E1C25" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A68DECC9-072F-43C0-90EF-02E8BBC9AE4C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h610e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B973879-DE48-4461-B543-98625EABCCE4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:h670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BCF3A230-7824-4417-B5C4-E2D30ECBE3AE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:hm670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70675897-E01D-4217-82AE-EC15AE58390E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3DBB4E3-B863-4333-AC01-DB21416FCB94" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:q670e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B479403-BA34-426F-8DB6-61303C57F268" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:r680e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20D230F-E14A-4986-8746-168CC9C61AD0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:w680:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF31448A-E935-4FFF-AF76-2B06EF71E229" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wm690:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5B7B7CD-63B7-4F80-A0A1-7C69F0868D1B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:z690:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D1C667A-A904-4707-BE7E-FF7530E0D716" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.50.25", + "matchCriteriaId": "8309D34C-DC54-480B-81CF-180D99D7C74F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04CEC115-871B-4222-A3F8-6B1EE15E9A2C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FD0BD9D-F741-457D-9495-8BCC3707D098" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2935CEA-13CE-4F4C-84B1-0318FB6FE39A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3BB7241-F796-44A7-8171-B555A45FF852" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F967E7C-E56D-46B2-AEB8-1931FA324029" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D902C7F-DCE8-41ED-8E80-26DA251FBF36" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71C505E0-3548-49BD-9B53-2A588FF29144" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5E735023-A75C-48E3-AD6B-BB29CF95B17F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3826FEBA-0B2E-403D-9A6A-0DA02FEF9A2B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4080CDEF-3938-44D5-9737-6A9D72DB54B7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A77976A7-6C2D-4E0B-A28B-06A23EEA0D68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5600350-04CC-4481-AC47-9F98BEB9D258" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5A64D0A-D1C2-41B3-B51B-563263438CA8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B57F4250-80C8-4612-97F6-2702D3F7DF25" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AA180B4-0EB8-4884-A600-BFAEB64A0A58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27D79952-8946-488A-8BD8-6129D97A8E34" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "752081F5-AE8D-4004-B564-863840AC52E1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5375A75A-85AA-4119-9F6C-1AD9D2550F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE7B5E21-2796-4578-998F-B03E26277DE7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D31CA93-6F45-4BCE-B504-35F6494B864C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*", + "matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.30.35", + "matchCriteriaId": "8D6704A4-E314-42A1-AF47-CF6CF3359A9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39FD6F9C-FEEA-4D52-8745-6477B50AFB0C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A4FD69F-FF53-43F4-97C8-40867DB67958" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.65", + "matchCriteriaId": "F770E30C-F4F6-4BF8-A040-09F5E6971633" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F751905-287E-47EA-93B8-2BA576052AAC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "614B1B4E-E1D7-417F-86D1-92F75D597E36" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BD11E86-B786-43C8-9B67-8F680CC30451" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D740D69-83B6-4DBF-8617-9B1E96DFF4FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9963C9F-2D15-479A-A6C1-0C9863904B7E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43454510-4BE7-4CD1-960D-AE1B36EFBEA5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7AFC285-2248-45E7-9009-1402628F17E4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "078DAE1F-8581-44FB-83EA-575685928C4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", + "matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6F3DE58-EC72-429F-A223-F2027D2828AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E6B9500-2C37-48D5-A0BA-A159D04AC6CD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BF497A0-30BC-42A4-A000-C0D564D4872A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3025301-52D3-43D7-B6AB-F3F0A5C882DC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9466A6CC-8D69-4EB5-94E2-611297120462" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2D116C4-698B-45BC-8622-87E142B37922" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9AFE4FE7-AA7E-425E-AF51-2FCB3E4E6C11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DCA6E61-F1C9-4629-9068-545B19CF95E1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36836EB0-99DD-4217-9182-1E9FC5656C42" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD507601-CD6D-4F11-A4A7-790FB740B401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "464587A0-9EAA-4DF5-AFEB-15F2FA9CD407" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1940F59A-67FD-45F9-9C78-51A50687628F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B722E2A-1262-44FD-8F7C-F9A9A5C78744" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA08C262-414E-401A-8F91-131626FA82A5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8D3D0CA-C981-4091-99F9-203DA8F156F2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39F9F143-0AB4-4302-82B8-B4EA790EB08D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE06C64A-1610-4340-98CF-AC91258AB215" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C27F79F3-EA0A-429C-8DA9-BC276A94AFB7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B07609EB-E10B-4253-938E-81566036D81B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CC44D69-AAAB-4524-9D12-F1A606D57831" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D23D2887-1246-4EA4-B8B6-57BC7FB869E6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEFC46D5-B23D-4513-9669-4DC53662F87B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.22.94", + "matchCriteriaId": "1ABE0238-FB80-410F-A9A6-97BA6F3AF6A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DB488DD-D97C-4E21-A055-E6CECBBBC34E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9DC12C97-9966-40E2-8B23-B4453EC9EA6A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E687CADE-6E49-4284-BD41-6CA2FDD846FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE862F15-69CC-488E-ABE8-1E23A5A1089F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9087D09E-ADCB-478A-87FD-B7113FD29EFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B43E11E-5350-4DDB-A743-F84D4D2286D4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D64D1ED-A386-4475-99AB-7727DE67E1A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6EFB4646-A5BA-4662-A47F-62407AFEDFF2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29A923F6-E352-4752-B7D3-007FE1CAFE06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E06531E6-126A-4FBB-BEBB-F9023C4738F1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93B8CDF0-1489-4E4C-B004-A22E06FC10D7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6ACF161-472E-4088-85C2-5940C9C88D45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E0B94F6-EC15-4C12-8BA5-CC6602A7A725" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "067C65E5-5392-4DAF-A6BD-640D78C19CE1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1647DAC-CED6-4DAF-8F82-A42D6D691DF0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D93CC498-F558-4C2F-9E14-7897060CA9FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D609DB7E-AE80-48E0-B7B6-E622B6208ABF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A09C3656-AE49-4F26-BD28-B725E8C40304" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "90F0D1EF-2FE1-498A-AE38-BF755A680E88" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22243DEF-F01B-4774-AEC1-40D776E1167E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25934425-944F-4B9A-8A16-F1DCBF3D5032" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A5BC76B-A4FC-4702-A544-889E62F8509E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F4E44C3-D29F-4057-AE12-BA19FFFF69E1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*", + "matchCriteriaId": "383DCE68-3882-4274-AA4A-5E030530E4BA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04EC7421-963C-43F7-9450-2E204BAFF1F1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5E3AF74E-C719-4E55-959D-681174FFFB90" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E290F38C-7A86-469D-9E6A-F0EC69DBE23A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6EF77397-85D0-4EC2-9887-2D0D9D253450" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E9761E8-7978-4141-94B5-EEFE7C00BC9A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A003F1FD-33A0-40B8-B2DC-75B5DB62B2C8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E921DEBA-3063-4639-9823-2FDDD8DEA793" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF44A7C9-834B-49DF-B1B6-B1575473179B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5983B72F-9194-47CB-B444-2ECC6360B686" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09C7CDA3-7C4D-4884-BF36-A8EB2C80C6B4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5E0E40BC-5745-4AB0-B991-61A0C63DB284" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E207648-E57F-4C43-8FDD-049BF9214664" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39EB131A-87DE-45FB-9025-B02EC28C4304" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AF30717-CBEF-42F9-AE0D-4F6A1877EA55" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99D0351-303B-4ABF-A7FD-734176095307" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B080431-626C-4A7B-AB37-47EE6811A5A0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76D48CFC-1322-4C53-8B53-88E7ACC724BE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F6456D0-32AE-44A9-9F63-AD64B5E49182" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "38EA99F9-22C2-47ED-9DDD-928E19C4C51E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F8867B2-F297-4D30-AD43-77B0F67FAE3E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*", + "matchCriteriaId": "178345A5-9A38-4C8F-B3BB-430276FA4998" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*", + "matchCriteriaId": "831A7D63-4638-480C-94CB-ED06613BA75C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "178D9E36-79EC-4672-8E46-0FD6597CA1CC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EED0D492-ADAB-41ED-A283-024D3CED441F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BBB5A97-EA4F-454C-819C-DE1CE7018E7A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9733E69-E7CF-444C-B72C-AC8E5DEF2449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FD24563-9157-4DE1-95ED-D4E3E879219E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F83F8602-6679-4B3C-BBDD-3BDB2B317F70" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CD3E45C-1943-42BA-9F6D-EA64D67BF954" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B27F755-4C38-4469-8A9D-C9266BDA53ED" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E21977E-7085-46C5-8E89-F952C2EBCE04" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB72D13B-5880-4CB2-8E80-CB6A39B5A302" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAF31FBF-20FB-4B8A-ADE1-E29BB8B8A702" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C8292CC-DACB-489A-BCB2-73DC2C6F944C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D83AEDF-2671-4278-8088-BA517192AB3E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF72F37A-2F28-40E6-A84B-0E1DF63B1812" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3EAE9CE6-DA95-40B0-AE65-656FA4603D1A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5241B3E0-F968-4B16-8BF8-191C6F7B224A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5EFB52DD-5B7D-45BA-B249-A134D1B9EBD3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B82FC910-F3AB-42BF-9740-EC09F0AC179D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3BA58EFB-7672-4902-ABC1-65217AA617AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96E2764D-7D6A-4CE0-A628-FFE966A6462F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D66D18C-17F2-4259-B1D8-7C63797A024C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25C8DFB5-9D8B-4370-849A-DC061910E54F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B704835-1250-44E1-923C-5DE2F4DD25D0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9236F094-B913-43F2-B703-CE33B9CEBA0F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E45FA170-5BBD-45FC-ABDF-FF0FAE58A50E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*", + "matchCriteriaId": "345FF353-FE25-41F4-97EC-FF32BE2796EA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68A9AD79-9B4B-4EE8-810B-359901C3540C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFD4F26B-8589-4BB0-8FC1-9F51E3B477F7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19BF77DA-E159-4336-A552-B22BE437670D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E86CCC45-270E-4760-A7E9-D39C74C00FCF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C105930C-D2BB-4FA1-B5D1-882D90D867C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45227E88-ACFF-43A5-AF45-C6542A6EF681" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA2030D-CEAF-46BF-9669-19EAD541BDB6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1612AE8A-3165-47A3-AEA8-65F4156C48BA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C5168E40-DF2F-4E39-8B5E-9659EBBB99A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94A6DA7A-7C97-40E1-B31A-B92BB658C429" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54AF128B-9984-4C91-B7F6-968DE376C3BE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28B167F1-63FA-4C86-84AB-836ABF84E6E3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "955420F9-3A3F-40E0-9940-DD43C5C78D62" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC4A437C-6C00-4729-91CC-D27EB3542633" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74ED727D-B1A9-4F4B-92C7-3F00F3A80013" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2C24951-B3FA-48E6-AFAC-6CA0D2348230" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*", + "matchCriteriaId": "185E8FBC-9EE9-472E-867B-0B0DEEECA13E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB3C00A0-C28A-46EB-853D-DAE3819399D9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBC93757-5FD7-403D-B5ED-CC8793002352" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89421EC5-52E5-441F-AD3B-5C5E964F836D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2117880B-FDD4-4A90-B29B-6D840D26645D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8EED1D9-75CC-41E9-9C0C-C648E0717024" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDB43A67-9DD7-49E6-BA77-220120C90700" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D3413CB-86D3-4684-B651-DBACC0660E76" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB677676-E793-4158-BF53-3F5ECCECE203" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F32E6092-1AF6-499F-B176-F575E766E8F3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E524AFD4-2D9F-4A4B-82F4-13BCDE99041E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39F309BC-6F31-490C-982B-14F9319276F2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA909754-B60A-4B30-AF42-4C8734E155AF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBEFB056-0872-434B-9630-28A1AAEAD470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD8EBFCC-AD76-4285-93BD-D14219C6EA5D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FF7E334-6DC7-44B5-A102-649A68300C80" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7305838B-84CA-4BB8-A350-B2D2844F1041" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D356D196-8AB0-4387-A644-C5E68174A60C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89587A92-6234-40C3-83DB-F72319FFBC79" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E50CC669-9555-45E9-A43B-05A21FB040E1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADA1FA19-A836-4D6A-8C2D-718ECE6866D2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3ECEBDB0-2E0A-416B-9737-82C1FC65A06C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C39B6A99-7060-4011-8FA3-E5ABE5C02813" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF9E723E-1095-424E-A90D-380CA0D2795E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35380FB9-90FF-405F-8E2E-01C1DD209540" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2215D655-0EA9-4530-AB68-7B1C7360D692" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "020B6FED-EAE2-478C-8FF4-CB75F24E9A9D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE519C62-F5BB-461C-91EF-2979CD506C63" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F693457C-3529-4E62-A672-1B862F235D0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.48", + "matchCriteriaId": "CC397B31-665E-4269-8EBB-D6587EA96DCF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*", + "matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*", + "matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE7B5E21-2796-4578-998F-B03E26277DE7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n5095:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77D279BF-5561-4B83-B05C-77597339ECB4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC903FA4-2C4E-4EBB-8BFA-579844B87354" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*", + "matchCriteriaId": "667F2E6C-C2FD-4E4B-9CC4-2EF33A74F61B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.1.94", + "matchCriteriaId": "BC1B37EB-660D-431E-B852-AE4392186C4B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*", + "matchCriteriaId": "454AC633-5F1C-47BB-8FA7-91A5C29A1DD5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2394E8C-58D9-480B-87A7-A41CD7697FC6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B9AC02B-D3AE-4FAF-836E-55515186A462" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B949F28E-5C73-4222-973E-DC39325E9268" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*", + "matchCriteriaId": "132E32FD-4A52-43AF-9C0A-75F299B4C93F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7087FCA7-6D5C-45A5-B380-533915BC608A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85683891-11D4-47B1-834B-5E0380351E78" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03D778C7-F242-4A6A-9B62-A7C578D985FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B57F4250-80C8-4612-97F6-2702D3F7DF25" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AA180B4-0EB8-4884-A600-BFAEB64A0A58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27D79952-8946-488A-8BD8-6129D97A8E34" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "752081F5-AE8D-4004-B564-863840AC52E1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5375A75A-85AA-4119-9F6C-1AD9D2550F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F784ABD5-3B08-4D87-9AAD-B68C1B5CC667" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:celeron_n3700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBEDA58C-BD03-4D92-9136-4BB668619D28" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4782.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4782.json index 10e560f84d3..f416c6db11e 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4782.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4782.json @@ -2,15 +2,38 @@ "id": "CVE-2022-4782", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-16T12:15:11.540", - "lastModified": "2023-08-16T12:16:08.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:48:57.427", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The ClickFunnels WordPress plugin through 3.1.1 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:clickfunnels:clickfunnels:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.1.1", + "matchCriteriaId": "69693061-CFAA-443B-8CEC-99A58D39A2EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/d3a0468a-8405-4b6c-800f-abd5ce5387b5", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0058.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0058.json index 355a4c9b83d..980d7884fbe 100644 --- a/CVE-2023/CVE-2023-00xx/CVE-2023-0058.json +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0058.json @@ -2,15 +2,38 @@ "id": "CVE-2023-0058", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-16T12:15:11.977", - "lastModified": "2023-08-16T12:16:08.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T17:07:19.763", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Tiempo.com WordPress plugin through 0.1.2 does not have CSRF check when creating and editing its shortcode, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -27,10 +50,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tiempo:tiempo:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.1.2", + "matchCriteriaId": "547AF578-7D43-4434-B16A-0A4BCF14605B" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/0e677df9-2c49-42f0-a8e2-dbcf85bfc1a2", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0551.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0551.json index c582ccb0152..7b13c026050 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0551.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0551.json @@ -2,15 +2,38 @@ "id": "CVE-2023-0551", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-16T12:15:12.150", - "lastModified": "2023-08-16T12:16:08.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:45:07.637", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The REST API TO MiniProgram WordPress plugin through 4.6.1 does not have authorisation and CSRF checks in an AJAX action, allowing ay authenticated users, such as subscriber to call and delete arbitrary attachments" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -27,10 +50,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:minapper:rest_api_to_miniprogram:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.6.1", + "matchCriteriaId": "75332304-20C9-4F09-93EF-91A41FF5B17A" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/de162a46-1fdb-47b9-9a61-f12a2c655a7d", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1977.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1977.json index bbe346aa705..228fd2e9644 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1977.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1977.json @@ -2,15 +2,38 @@ "id": "CVE-2023-1977", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-16T12:15:12.510", - "lastModified": "2023-08-16T12:16:08.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:44:31.767", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Booking Manager WordPress plugin before 2.0.29 does not validate URLs input in it's admin panel or in shortcodes for showing events from a remote .ics file, allowing an attacker with privileges as low as Subscriber to perform SSRF attacks on the sites internal network." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oplugins:booking_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.29", + "matchCriteriaId": "031ACC93-E8DD-4C45-BDC6-681793DFB160" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/842f3b1f-395a-4ea2-b7df-a36f70e8c790", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2122.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2122.json index b7d693d3cbc..032c8f45373 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2122.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2122.json @@ -2,15 +2,38 @@ "id": "CVE-2023-2122", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-16T12:15:12.607", - "lastModified": "2023-08-16T12:16:08.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:44:04.120", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Image Optimizer by 10web WordPress plugin before 1.0.27 does not sanitise and escape the iowd_tabs_active parameter before rendering it in the plugin admin panel, leading to a reflected Cross-Site Scripting vulnerability, allowing an attacker to trick a logged in admin to execute arbitrary javascript by clicking a link." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:image_optimizer:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.27", + "matchCriteriaId": "48C35DA0-C199-4319-A6AB-7EBDB7969E41" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/936fd93a-428d-4744-a4fc-c8da78dcbe78", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2123.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2123.json index d73f6041f29..c7436217ce1 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2123.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2123.json @@ -2,15 +2,38 @@ "id": "CVE-2023-2123", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-16T12:15:12.700", - "lastModified": "2023-08-16T12:16:08.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:43:44.743", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The WP Inventory Manager WordPress plugin before 2.1.0.13 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,14 +46,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpinventory:wp_inventory_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.0.13", + "matchCriteriaId": "CE73EF26-CCE9-480B-A49C-41BB735D5F48" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/daniloalbuqrque/poc-cve-xss-encoded-wp-inventory-manager-plugin", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit" + ] }, { "url": "https://wpscan.com/vulnerability/44448888-cd5d-482e-859e-123e442ce5c1", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22955.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22955.json index 0a72aa93722..1fb7599473b 100644 --- a/CVE-2023/CVE-2023-229xx/CVE-2023-22955.json +++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22955.json @@ -2,31 +2,251 @@ "id": "CVE-2023-22955", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-11T20:15:14.607", - "lastModified": "2023-08-17T19:15:11.887", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T17:09:40.927", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered on AudioCodes VoIP desk phones through 3.4.4.1000. The validation of firmware images only consists of simple checksum checks for different firmware components. Thus, by knowing how to calculate and where to store the required checksums for the flasher tool, an attacker is able to store malicious firmware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:c470hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "0AD6593B-6088-4EBB-899E-42142251874E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:c470hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "775A2A42-B3C2-454E-9677-22512DA3A17E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:c455hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "6B673481-C80C-4C76-968A-034303233827" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:c455hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58D3A875-ADA0-4126-AE7F-3A27F6ECC6B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:c435hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "6B52B0A3-52A7-4E10-B054-201A2E2D37CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:c435hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054FD690-9C40-4ADA-910A-1E18D7F5E7E4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:445hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "D5E811CB-FDDD-4E7A-94AD-AD0EBA5F521F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:445hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF916875-0CAB-4185-8466-887DF7B78A7D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:405hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "A71440BE-ABF8-4DED-B211-94C9812B51E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:405hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "67577D7D-EFCD-4CC1-8492-39D36817BAC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:c450hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "5B3A5439-56D9-4E8D-A52B-EDBFA72BD3CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:c450hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "64EFD9E4-D694-43E2-88A5-8FB7431C5B98" + } + ] + } + ] + } + ], "references": [ { "url": "http://packetstormsecurity.com/files/174214/AudioCodes-VoIP-Phones-Insufficient-Firmware-Validation.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Aug/17", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://syss.de", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-055.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22956.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22956.json index cdd0a0a9a1b..a959dfd7809 100644 --- a/CVE-2023/CVE-2023-229xx/CVE-2023-22956.json +++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22956.json @@ -2,31 +2,252 @@ "id": "CVE-2023-22956", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-11T20:15:14.703", - "lastModified": "2023-08-17T19:15:11.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T17:09:33.733", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered on AudioCodes VoIP desk phones through 3.4.4.1000. Due to the use of a hard-coded cryptographic key, an attacker is able to decrypt encrypted configuration files and retrieve sensitive information." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:c470hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "0AD6593B-6088-4EBB-899E-42142251874E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:c470hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "775A2A42-B3C2-454E-9677-22512DA3A17E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:c455hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "6B673481-C80C-4C76-968A-034303233827" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:c455hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58D3A875-ADA0-4126-AE7F-3A27F6ECC6B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:c435hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "6B52B0A3-52A7-4E10-B054-201A2E2D37CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:c435hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054FD690-9C40-4ADA-910A-1E18D7F5E7E4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:445hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "D5E811CB-FDDD-4E7A-94AD-AD0EBA5F521F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:445hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF916875-0CAB-4185-8466-887DF7B78A7D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:405hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "A71440BE-ABF8-4DED-B211-94C9812B51E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:405hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "67577D7D-EFCD-4CC1-8492-39D36817BAC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:c450hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "5B3A5439-56D9-4E8D-A52B-EDBFA72BD3CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:c450hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "64EFD9E4-D694-43E2-88A5-8FB7431C5B98" + } + ] + } + ] + } + ], "references": [ { "url": "http://packetstormsecurity.com/files/174216/AudioCodes-VoIP-Phones-Hardcoded-Key.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Aug/16", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://syss.de", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-054.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22957.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22957.json index c3bd3359052..140a556df91 100644 --- a/CVE-2023/CVE-2023-229xx/CVE-2023-22957.json +++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22957.json @@ -2,31 +2,253 @@ "id": "CVE-2023-22957", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-11T20:15:14.787", - "lastModified": "2023-08-17T19:15:12.003", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:45:55.407", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in libac_des3.so on AudioCodes VoIP desk phones through 3.4.4.1000. Due to the use of hard-coded cryptographic key, an attacker with access to backup or configuration files is able to decrypt encrypted values and retrieve sensitive information, e.g., the device root password." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:c470hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "0AD6593B-6088-4EBB-899E-42142251874E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:c470hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "775A2A42-B3C2-454E-9677-22512DA3A17E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:c455hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "6B673481-C80C-4C76-968A-034303233827" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:c455hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58D3A875-ADA0-4126-AE7F-3A27F6ECC6B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:c435hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "6B52B0A3-52A7-4E10-B054-201A2E2D37CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:c435hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054FD690-9C40-4ADA-910A-1E18D7F5E7E4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:445hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "D5E811CB-FDDD-4E7A-94AD-AD0EBA5F521F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:445hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF916875-0CAB-4185-8466-887DF7B78A7D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:405hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "A71440BE-ABF8-4DED-B211-94C9812B51E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:405hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "67577D7D-EFCD-4CC1-8492-39D36817BAC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:audiocodes:c450hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.4.1000", + "matchCriteriaId": "5B3A5439-56D9-4E8D-A52B-EDBFA72BD3CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:audiocodes:c450hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "64EFD9E4-D694-43E2-88A5-8FB7431C5B98" + } + ] + } + ] + } + ], "references": [ { "url": "http://packetstormsecurity.com/files/174215/AudioCodes-VoIP-Phones-Hardcoded-Key.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Aug/15", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://syss.de", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-052.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2225.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2225.json index 5188bf0d5b1..fb0f6bc0f53 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2225.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2225.json @@ -2,15 +2,38 @@ "id": "CVE-2023-2225", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-16T12:15:12.797", - "lastModified": "2023-08-16T12:16:08.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:43:29.000", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The SEO ALert WordPress plugin through 1.59 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pottie:seo_alert:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.59", + "matchCriteriaId": "BF0BDF6B-80D8-4A34-8C35-2584C84F71BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/0af475ba-5c02-4f62-876d-6235a745bbd6", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2254.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2254.json index e8949fd5ca6..325ae4494dc 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2254.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2254.json @@ -2,18 +2,41 @@ "id": "CVE-2023-2254", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-16T12:15:12.887", - "lastModified": "2023-08-16T12:16:08.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:43:12.597", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Ko-fi Button WordPress plugin before 1.3.3 does not properly some of its settings, which could allow high-privilege users to perform Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html capability is disallowed (for example in multisite setup), and we consider it a low risk." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { - "source": "contact@wpscan.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -21,12 +44,44 @@ "value": "CWE-79" } ] + }, + { + "source": "contact@wpscan.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ko-fi:ko-fi_button:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "2E9D8D0A-FA5D-4A27-96E5-8DC61A7DC70E" + } + ] + } + ] } ], "references": [ { "url": "https://wpscan.com/vulnerability/8886ec5f-8465-448f-adbd-68a3e84c5dec", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2271.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2271.json index 323dea436e5..f168230804a 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2271.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2271.json @@ -2,15 +2,38 @@ "id": "CVE-2023-2271", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-16T12:15:12.967", - "lastModified": "2023-08-16T12:16:08.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:42:50.617", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Tiempo.com WordPress plugin through 0.1.2 does not have CSRF check when deleting its shortcode, which could allow attackers to make logged in admins delete arbitrary shortcode via a CSRF attack" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tiempo:tiempo:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.1.2", + "matchCriteriaId": "547AF578-7D43-4434-B16A-0A4BCF14605B" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/31512f33-c310-4b36-b665-19293097cc8b", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2272.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2272.json index ee75229ee2f..f1620ee503a 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2272.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2272.json @@ -2,15 +2,38 @@ "id": "CVE-2023-2272", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-16T12:15:13.053", - "lastModified": "2023-08-16T12:16:08.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:42:32.733", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Tiempo.com WordPress plugin through 0.1.2 does not sanitise and escape the page parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tiempo:tiempo:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.1.2", + "matchCriteriaId": "547AF578-7D43-4434-B16A-0A4BCF14605B" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/dba60216-2753-40b7-8f2b-6caeba684b2e", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2312.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2312.json index 9b6ed4e7947..97f7c21d4f0 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2312.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2312.json @@ -2,31 +2,109 @@ "id": "CVE-2023-2312", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-08-15T18:15:10.017", - "lastModified": "2023-08-20T03:15:09.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T17:28:52.263", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Use after free in Offline in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "116.0.5845.96", + "matchCriteriaId": "40820217-BB18-474A-8520-109C1635D656" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://crbug.com/1448548", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5479", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30779.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30779.json index 65a9926a7ff..3bd099a9c0e 100644 --- a/CVE-2023/CVE-2023-307xx/CVE-2023-30779.json +++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30779.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30779", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-16T11:15:10.617", - "lastModified": "2023-08-16T12:02:41.873", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:49:39.823", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:daggerheart:query_wrangler:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.5.51", + "matchCriteriaId": "74ADDDFF-F4FD-4800-BE34-F9B286F0FC6B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/query-wrangler/wordpress-query-wrangler-plugin-1-5-51-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30786.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30786.json index fd13676c300..bf2642018d4 100644 --- a/CVE-2023/CVE-2023-307xx/CVE-2023-30786.json +++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30786.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30786", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-16T10:15:21.380", - "lastModified": "2023-08-16T12:02:41.873", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:49:51.777", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fuzzguard:captcha_them_all:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.3", + "matchCriteriaId": "D07ECC33-5FFA-4EE4-9736-D62306AB7BDF" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/captcha-them-all/wordpress-captcha-them-all-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-308xx/CVE-2023-30871.json b/CVE-2023/CVE-2023-308xx/CVE-2023-30871.json index 26500cb2537..79f64c82ead 100644 --- a/CVE-2023/CVE-2023-308xx/CVE-2023-30871.json +++ b/CVE-2023/CVE-2023-308xx/CVE-2023-30871.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30871", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-16T11:15:11.100", - "lastModified": "2023-08-16T12:02:41.873", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:49:32.083", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webdados:stock_exporter_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1.0", + "matchCriteriaId": "3AB77174-8FB4-43FB-87D7-FD596CB9A405" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/stock-exporter-for-woocommerce/wordpress-stock-exporter-for-woocommerce-plugin-1-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31041.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31041.json index df29e4fa1d8..461b6a60559 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31041.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31041.json @@ -2,19 +2,94 @@ "id": "CVE-2023-31041", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T15:15:12.237", - "lastModified": "2023-08-14T15:58:29.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T17:59:25.407", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in SysPasswordDxe in Insyde InsydeH2O with kernel 5.0 through 5.5. System password information could optionally be stored in cleartext, which might lead to possible information disclosure." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:insyde:insydeh2o:05.28.19:*:*:*:*:*:*:*", + "matchCriteriaId": "01566E54-2842-4B3E-9030-CA70FC5B020B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:insyde:insydeh2o:05.37.19:*:*:*:*:*:*:*", + "matchCriteriaId": "EEFC1B46-12FB-4963-9728-CFB372BAE7E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:insyde:insydeh2o:05.45.19:*:*:*:*:*:*:*", + "matchCriteriaId": "625BE1C3-0CE2-458B-A919-58D0D7CB685F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:insyde:insydeh2o:05.53.19:*:*:*:*:*:*:*", + "matchCriteriaId": "CCBC9852-F065-46F7-997E-28557EB8E9FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:insyde:insydeh2o:05.60.20:*:*:*:*:*:*:*", + "matchCriteriaId": "87B31FE0-9B1A-4B19-9A58-4DF2F94A1494" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.insyde.com/security-pledge/SA-2023047", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32006.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32006.json index 83e67a22f8b..ac43b3223a7 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32006.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32006.json @@ -2,27 +2,124 @@ "id": "CVE-2023-32006", "sourceIdentifier": "support@hackerone.com", "published": "2023-08-15T16:15:11.460", - "lastModified": "2023-08-19T03:15:25.100", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T17:41:28.640", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndIncluding": "16.20.1", + "matchCriteriaId": "F7394398-D1FA-4786-B962-7D0FFF50DB2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", + "versionStartIncluding": "18.0.0", + "versionEndIncluding": "18.17.0", + "matchCriteriaId": "7DAF267F-6FDD-4914-B37E-181B91BF8B64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", + "versionStartIncluding": "20.0.0", + "versionEndIncluding": "20.5.0", + "matchCriteriaId": "145E971E-F0AF-49A7-8A9C-3AAFE01C076B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://hackerone.com/reports/2043807", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQPELKG2LVTADSB7ME73AV4DXQK47PWK/", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBOZE2QZIBLFFTYWYN23FGKN6HULZ6HX/", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3259.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3259.json index f575e7f5bfe..9a7013faeb5 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3259.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3259.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3259", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2023-08-14T04:15:10.417", - "lastModified": "2023-08-14T13:06:15.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:39:21.000", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -46,10 +76,631 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "75AF2211-53B1-4F67-8297-5594354ECEE0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B786B2F4-6586-4E05-BDE9-DFDBA7BD3739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "70C45633-4466-4DA1-87BC-668E97C903B9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C10BFD7F-0EDC-4CA0-9BEE-2CD0C83CAA05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "2BCFF66D-7D0E-4D88-A03F-3F2A1A6796B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82C1859A-0D39-4D69-B89F-E6AB92D71A38" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "95E21D0F-14EE-4B5F-B88C-AEA69F218751" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23BC31CA-2061-4141-8600-EF4A9AE7DD2A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "0E2EB4DE-CA66-4D74-BCCE-EDDC4FB2CFD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12B9705B-B21D-450B-A62B-933DC81A19E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "FB9C4427-9857-4E60-8D72-20428271E6FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "936B8451-A674-49D7-91EC-A03599A6D6AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "828F1A3D-19FD-4304-86CC-422E6A36FA94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEBA453E-67D9-4760-89A6-6CF8C632C6A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "62E22AE5-1F67-458A-A15E-D97ECBA22192" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1139B205-02DA-4155-897C-F5D4191686A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E2580B4F-179A-4AEB-9761-700DC2D9D21E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1469E464-6784-4B0B-9895-79BA5A1A1CB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "945D8983-5B68-4317-A481-0F1672939CAB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A017B904-A3C4-4070-96F7-9679FD2383C9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E279B412-EE14-419E-A5C8-71CE9A2007A5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "518EE433-9E08-40FE-90F7-48E8AC934743" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DED62B20-FBF2-43B0-AB69-9301CBB2BA23" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1C46D12-6699-4BAC-AC47-7B150AECAF9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "2CB3A4AF-E802-420F-80EE-A3E89D862CD2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58CE9F4A-74BD-4AFC-B019-5D750E2D1E16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "169B8589-3268-4D47-9947-D2353E05EDFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DFC4885-AF94-471E-AE4E-DD26A6A91667" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "1518F9D6-DFB2-4A24-947A-C7B03DBE0D3A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5042C3C1-3964-437B-98C1-0458F73B7197" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "FF27BF0A-3105-4508-9F9D-5B7AAFC6BFD4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1522EB30-AB31-47E3-B2EB-90CE231C284B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E2568F56-2285-4D3F-ADD2-0D502774F9CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56E2CAAD-8A4D-4F1A-AEF0-034C02965935" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DA8A8BB2-BBDF-41AB-AFFD-40A42C40DC30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B1D3E7F-9C2F-48F8-BF49-539570A0986A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DEDC5FD0-5677-4219-85B8-C797BD4246A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACA11FBB-1B4C-4F66-89EF-2D91C0161C4C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "BA54E12D-29DD-448A-B9DB-62449DBEC68F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBD2B738-620D-42F8-881C-A6B293B724BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "30C50080-1D24-4D2D-A0DF-AF7D80FFD513" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1A43409-AF18-4BD5-A0D4-D27CDD6ABBE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "BD655BA7-113E-4071-832E-8ECB38F10E14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B64FEC33-D6D9-4F4C-BE43-31D637E6B01F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html", - "source": "trellixpsirt@trellix.com" + "source": "trellixpsirt@trellix.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3260.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3260.json index 420c00a9344..46edbc70110 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3260.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3260.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3260", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2023-08-14T04:15:10.830", - "lastModified": "2023-08-14T13:06:15.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:36:37.510", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -46,10 +76,647 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cyberpower:powerpanel_server:*:*:*:*:enterprise:*:*:*", + "versionEndExcluding": "2.6.9", + "matchCriteriaId": "054765FB-5866-4141-A0F3-F4A3BCAB7C15" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "75AF2211-53B1-4F67-8297-5594354ECEE0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B786B2F4-6586-4E05-BDE9-DFDBA7BD3739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "70C45633-4466-4DA1-87BC-668E97C903B9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C10BFD7F-0EDC-4CA0-9BEE-2CD0C83CAA05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "2BCFF66D-7D0E-4D88-A03F-3F2A1A6796B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82C1859A-0D39-4D69-B89F-E6AB92D71A38" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "95E21D0F-14EE-4B5F-B88C-AEA69F218751" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23BC31CA-2061-4141-8600-EF4A9AE7DD2A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "0E2EB4DE-CA66-4D74-BCCE-EDDC4FB2CFD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12B9705B-B21D-450B-A62B-933DC81A19E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "FB9C4427-9857-4E60-8D72-20428271E6FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "936B8451-A674-49D7-91EC-A03599A6D6AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "828F1A3D-19FD-4304-86CC-422E6A36FA94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEBA453E-67D9-4760-89A6-6CF8C632C6A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "62E22AE5-1F67-458A-A15E-D97ECBA22192" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1139B205-02DA-4155-897C-F5D4191686A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E2580B4F-179A-4AEB-9761-700DC2D9D21E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1469E464-6784-4B0B-9895-79BA5A1A1CB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "945D8983-5B68-4317-A481-0F1672939CAB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A017B904-A3C4-4070-96F7-9679FD2383C9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E279B412-EE14-419E-A5C8-71CE9A2007A5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "518EE433-9E08-40FE-90F7-48E8AC934743" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DED62B20-FBF2-43B0-AB69-9301CBB2BA23" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1C46D12-6699-4BAC-AC47-7B150AECAF9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "2CB3A4AF-E802-420F-80EE-A3E89D862CD2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58CE9F4A-74BD-4AFC-B019-5D750E2D1E16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "169B8589-3268-4D47-9947-D2353E05EDFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DFC4885-AF94-471E-AE4E-DD26A6A91667" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "1518F9D6-DFB2-4A24-947A-C7B03DBE0D3A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5042C3C1-3964-437B-98C1-0458F73B7197" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "FF27BF0A-3105-4508-9F9D-5B7AAFC6BFD4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1522EB30-AB31-47E3-B2EB-90CE231C284B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E2568F56-2285-4D3F-ADD2-0D502774F9CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56E2CAAD-8A4D-4F1A-AEF0-034C02965935" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DA8A8BB2-BBDF-41AB-AFFD-40A42C40DC30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B1D3E7F-9C2F-48F8-BF49-539570A0986A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DEDC5FD0-5677-4219-85B8-C797BD4246A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACA11FBB-1B4C-4F66-89EF-2D91C0161C4C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "BA54E12D-29DD-448A-B9DB-62449DBEC68F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBD2B738-620D-42F8-881C-A6B293B724BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "30C50080-1D24-4D2D-A0DF-AF7D80FFD513" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1A43409-AF18-4BD5-A0D4-D27CDD6ABBE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "BD655BA7-113E-4071-832E-8ECB38F10E14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B64FEC33-D6D9-4F4C-BE43-31D637E6B01F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html", - "source": "trellixpsirt@trellix.com" + "source": "trellixpsirt@trellix.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3261.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3261.json index 8ff7a3d7291..84dda1695af 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3261.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3261.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3261", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2023-08-14T04:15:10.940", - "lastModified": "2023-08-14T13:06:15.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:33:49.237", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -46,10 +76,647 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cyberpower:powerpanel_server:*:*:*:*:enterprise:*:*:*", + "versionEndExcluding": "2.6.9", + "matchCriteriaId": "054765FB-5866-4141-A0F3-F4A3BCAB7C15" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "75AF2211-53B1-4F67-8297-5594354ECEE0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B786B2F4-6586-4E05-BDE9-DFDBA7BD3739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "70C45633-4466-4DA1-87BC-668E97C903B9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C10BFD7F-0EDC-4CA0-9BEE-2CD0C83CAA05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "2BCFF66D-7D0E-4D88-A03F-3F2A1A6796B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82C1859A-0D39-4D69-B89F-E6AB92D71A38" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "95E21D0F-14EE-4B5F-B88C-AEA69F218751" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23BC31CA-2061-4141-8600-EF4A9AE7DD2A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "0E2EB4DE-CA66-4D74-BCCE-EDDC4FB2CFD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12B9705B-B21D-450B-A62B-933DC81A19E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "FB9C4427-9857-4E60-8D72-20428271E6FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "936B8451-A674-49D7-91EC-A03599A6D6AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "828F1A3D-19FD-4304-86CC-422E6A36FA94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEBA453E-67D9-4760-89A6-6CF8C632C6A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "62E22AE5-1F67-458A-A15E-D97ECBA22192" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1139B205-02DA-4155-897C-F5D4191686A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E2580B4F-179A-4AEB-9761-700DC2D9D21E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1469E464-6784-4B0B-9895-79BA5A1A1CB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "945D8983-5B68-4317-A481-0F1672939CAB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A017B904-A3C4-4070-96F7-9679FD2383C9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E279B412-EE14-419E-A5C8-71CE9A2007A5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "518EE433-9E08-40FE-90F7-48E8AC934743" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DED62B20-FBF2-43B0-AB69-9301CBB2BA23" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1C46D12-6699-4BAC-AC47-7B150AECAF9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "2CB3A4AF-E802-420F-80EE-A3E89D862CD2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58CE9F4A-74BD-4AFC-B019-5D750E2D1E16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "169B8589-3268-4D47-9947-D2353E05EDFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DFC4885-AF94-471E-AE4E-DD26A6A91667" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "1518F9D6-DFB2-4A24-947A-C7B03DBE0D3A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5042C3C1-3964-437B-98C1-0458F73B7197" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "FF27BF0A-3105-4508-9F9D-5B7AAFC6BFD4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1522EB30-AB31-47E3-B2EB-90CE231C284B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E2568F56-2285-4D3F-ADD2-0D502774F9CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56E2CAAD-8A4D-4F1A-AEF0-034C02965935" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DA8A8BB2-BBDF-41AB-AFFD-40A42C40DC30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B1D3E7F-9C2F-48F8-BF49-539570A0986A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DEDC5FD0-5677-4219-85B8-C797BD4246A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACA11FBB-1B4C-4F66-89EF-2D91C0161C4C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "BA54E12D-29DD-448A-B9DB-62449DBEC68F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBD2B738-620D-42F8-881C-A6B293B724BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "30C50080-1D24-4D2D-A0DF-AF7D80FFD513" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1A43409-AF18-4BD5-A0D4-D27CDD6ABBE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "BD655BA7-113E-4071-832E-8ECB38F10E14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B64FEC33-D6D9-4F4C-BE43-31D637E6B01F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html", - "source": "trellixpsirt@trellix.com" + "source": "trellixpsirt@trellix.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3262.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3262.json index 1b1dc655979..1fdd6e2904c 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3262.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3262.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3262", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2023-08-14T04:15:11.043", - "lastModified": "2023-08-14T13:06:15.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:32:19.017", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -46,10 +76,631 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "75AF2211-53B1-4F67-8297-5594354ECEE0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B786B2F4-6586-4E05-BDE9-DFDBA7BD3739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "70C45633-4466-4DA1-87BC-668E97C903B9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C10BFD7F-0EDC-4CA0-9BEE-2CD0C83CAA05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "2BCFF66D-7D0E-4D88-A03F-3F2A1A6796B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82C1859A-0D39-4D69-B89F-E6AB92D71A38" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "95E21D0F-14EE-4B5F-B88C-AEA69F218751" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23BC31CA-2061-4141-8600-EF4A9AE7DD2A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "0E2EB4DE-CA66-4D74-BCCE-EDDC4FB2CFD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12B9705B-B21D-450B-A62B-933DC81A19E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "FB9C4427-9857-4E60-8D72-20428271E6FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "936B8451-A674-49D7-91EC-A03599A6D6AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "828F1A3D-19FD-4304-86CC-422E6A36FA94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEBA453E-67D9-4760-89A6-6CF8C632C6A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "62E22AE5-1F67-458A-A15E-D97ECBA22192" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1139B205-02DA-4155-897C-F5D4191686A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E2580B4F-179A-4AEB-9761-700DC2D9D21E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1469E464-6784-4B0B-9895-79BA5A1A1CB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "945D8983-5B68-4317-A481-0F1672939CAB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A017B904-A3C4-4070-96F7-9679FD2383C9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E279B412-EE14-419E-A5C8-71CE9A2007A5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "518EE433-9E08-40FE-90F7-48E8AC934743" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DED62B20-FBF2-43B0-AB69-9301CBB2BA23" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1C46D12-6699-4BAC-AC47-7B150AECAF9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "2CB3A4AF-E802-420F-80EE-A3E89D862CD2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58CE9F4A-74BD-4AFC-B019-5D750E2D1E16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "169B8589-3268-4D47-9947-D2353E05EDFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DFC4885-AF94-471E-AE4E-DD26A6A91667" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "1518F9D6-DFB2-4A24-947A-C7B03DBE0D3A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5042C3C1-3964-437B-98C1-0458F73B7197" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "FF27BF0A-3105-4508-9F9D-5B7AAFC6BFD4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1522EB30-AB31-47E3-B2EB-90CE231C284B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E2568F56-2285-4D3F-ADD2-0D502774F9CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56E2CAAD-8A4D-4F1A-AEF0-034C02965935" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DA8A8BB2-BBDF-41AB-AFFD-40A42C40DC30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B1D3E7F-9C2F-48F8-BF49-539570A0986A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DEDC5FD0-5677-4219-85B8-C797BD4246A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACA11FBB-1B4C-4F66-89EF-2D91C0161C4C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "BA54E12D-29DD-448A-B9DB-62449DBEC68F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBD2B738-620D-42F8-881C-A6B293B724BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "30C50080-1D24-4D2D-A0DF-AF7D80FFD513" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1A43409-AF18-4BD5-A0D4-D27CDD6ABBE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "BD655BA7-113E-4071-832E-8ECB38F10E14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B64FEC33-D6D9-4F4C-BE43-31D637E6B01F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html", - "source": "trellixpsirt@trellix.com" + "source": "trellixpsirt@trellix.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3263.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3263.json index 319fd6f6ec0..6c40dad8b05 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3263.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3263.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3263", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2023-08-14T05:15:09.833", - "lastModified": "2023-08-14T13:06:15.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:24:14.497", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -46,10 +76,631 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "75AF2211-53B1-4F67-8297-5594354ECEE0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B786B2F4-6586-4E05-BDE9-DFDBA7BD3739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "70C45633-4466-4DA1-87BC-668E97C903B9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C10BFD7F-0EDC-4CA0-9BEE-2CD0C83CAA05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "2BCFF66D-7D0E-4D88-A03F-3F2A1A6796B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82C1859A-0D39-4D69-B89F-E6AB92D71A38" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "95E21D0F-14EE-4B5F-B88C-AEA69F218751" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23BC31CA-2061-4141-8600-EF4A9AE7DD2A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "0E2EB4DE-CA66-4D74-BCCE-EDDC4FB2CFD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12B9705B-B21D-450B-A62B-933DC81A19E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "FB9C4427-9857-4E60-8D72-20428271E6FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "936B8451-A674-49D7-91EC-A03599A6D6AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "828F1A3D-19FD-4304-86CC-422E6A36FA94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEBA453E-67D9-4760-89A6-6CF8C632C6A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "62E22AE5-1F67-458A-A15E-D97ECBA22192" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1139B205-02DA-4155-897C-F5D4191686A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E2580B4F-179A-4AEB-9761-700DC2D9D21E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1469E464-6784-4B0B-9895-79BA5A1A1CB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "945D8983-5B68-4317-A481-0F1672939CAB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A017B904-A3C4-4070-96F7-9679FD2383C9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E279B412-EE14-419E-A5C8-71CE9A2007A5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "518EE433-9E08-40FE-90F7-48E8AC934743" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DED62B20-FBF2-43B0-AB69-9301CBB2BA23" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1C46D12-6699-4BAC-AC47-7B150AECAF9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "2CB3A4AF-E802-420F-80EE-A3E89D862CD2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58CE9F4A-74BD-4AFC-B019-5D750E2D1E16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "169B8589-3268-4D47-9947-D2353E05EDFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DFC4885-AF94-471E-AE4E-DD26A6A91667" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "1518F9D6-DFB2-4A24-947A-C7B03DBE0D3A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5042C3C1-3964-437B-98C1-0458F73B7197" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "FF27BF0A-3105-4508-9F9D-5B7AAFC6BFD4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1522EB30-AB31-47E3-B2EB-90CE231C284B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E2568F56-2285-4D3F-ADD2-0D502774F9CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56E2CAAD-8A4D-4F1A-AEF0-034C02965935" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DA8A8BB2-BBDF-41AB-AFFD-40A42C40DC30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B1D3E7F-9C2F-48F8-BF49-539570A0986A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DEDC5FD0-5677-4219-85B8-C797BD4246A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACA11FBB-1B4C-4F66-89EF-2D91C0161C4C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "BA54E12D-29DD-448A-B9DB-62449DBEC68F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBD2B738-620D-42F8-881C-A6B293B724BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "30C50080-1D24-4D2D-A0DF-AF7D80FFD513" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1A43409-AF18-4BD5-A0D4-D27CDD6ABBE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "BD655BA7-113E-4071-832E-8ECB38F10E14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B64FEC33-D6D9-4F4C-BE43-31D637E6B01F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html", - "source": "trellixpsirt@trellix.com" + "source": "trellixpsirt@trellix.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3264.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3264.json index 17fde169bb4..cc6d7b1a2ce 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3264.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3264.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3264", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2023-08-14T05:15:09.910", - "lastModified": "2023-08-14T13:06:15.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:20:54.007", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -46,10 +76,647 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cyberpower:powerpanel_server:*:*:*:*:enterprise:*:*:*", + "versionEndExcluding": "2.6.9", + "matchCriteriaId": "054765FB-5866-4141-A0F3-F4A3BCAB7C15" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "75AF2211-53B1-4F67-8297-5594354ECEE0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B786B2F4-6586-4E05-BDE9-DFDBA7BD3739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "70C45633-4466-4DA1-87BC-668E97C903B9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C10BFD7F-0EDC-4CA0-9BEE-2CD0C83CAA05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "2BCFF66D-7D0E-4D88-A03F-3F2A1A6796B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82C1859A-0D39-4D69-B89F-E6AB92D71A38" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "95E21D0F-14EE-4B5F-B88C-AEA69F218751" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23BC31CA-2061-4141-8600-EF4A9AE7DD2A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "0E2EB4DE-CA66-4D74-BCCE-EDDC4FB2CFD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12B9705B-B21D-450B-A62B-933DC81A19E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "FB9C4427-9857-4E60-8D72-20428271E6FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "936B8451-A674-49D7-91EC-A03599A6D6AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "828F1A3D-19FD-4304-86CC-422E6A36FA94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEBA453E-67D9-4760-89A6-6CF8C632C6A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "62E22AE5-1F67-458A-A15E-D97ECBA22192" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1139B205-02DA-4155-897C-F5D4191686A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E2580B4F-179A-4AEB-9761-700DC2D9D21E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1469E464-6784-4B0B-9895-79BA5A1A1CB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "945D8983-5B68-4317-A481-0F1672939CAB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A017B904-A3C4-4070-96F7-9679FD2383C9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E279B412-EE14-419E-A5C8-71CE9A2007A5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "518EE433-9E08-40FE-90F7-48E8AC934743" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DED62B20-FBF2-43B0-AB69-9301CBB2BA23" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1C46D12-6699-4BAC-AC47-7B150AECAF9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "2CB3A4AF-E802-420F-80EE-A3E89D862CD2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58CE9F4A-74BD-4AFC-B019-5D750E2D1E16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "169B8589-3268-4D47-9947-D2353E05EDFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DFC4885-AF94-471E-AE4E-DD26A6A91667" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "1518F9D6-DFB2-4A24-947A-C7B03DBE0D3A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5042C3C1-3964-437B-98C1-0458F73B7197" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "FF27BF0A-3105-4508-9F9D-5B7AAFC6BFD4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1522EB30-AB31-47E3-B2EB-90CE231C284B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "E2568F56-2285-4D3F-ADD2-0D502774F9CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56E2CAAD-8A4D-4F1A-AEF0-034C02965935" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DA8A8BB2-BBDF-41AB-AFFD-40A42C40DC30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B1D3E7F-9C2F-48F8-BF49-539570A0986A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "DEDC5FD0-5677-4219-85B8-C797BD4246A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACA11FBB-1B4C-4F66-89EF-2D91C0161C4C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "BA54E12D-29DD-448A-B9DB-62449DBEC68F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBD2B738-620D-42F8-881C-A6B293B724BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "30C50080-1D24-4D2D-A0DF-AF7D80FFD513" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1A43409-AF18-4BD5-A0D4-D27CDD6ABBE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.0804202", + "matchCriteriaId": "BD655BA7-113E-4071-832E-8ECB38F10E14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B64FEC33-D6D9-4F4C-BE43-31D637E6B01F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html", - "source": "trellixpsirt@trellix.com" + "source": "trellixpsirt@trellix.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3265.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3265.json index d0e5f44b810..b5930c8f3ec 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3265.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3265.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3265", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2023-08-14T05:15:09.987", - "lastModified": "2023-08-14T13:06:15.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:20:24.977", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -46,10 +76,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cyberpower:powerpanel_server:*:*:*:*:enterprise:*:*:*", + "versionEndExcluding": "2.6.9", + "matchCriteriaId": "054765FB-5866-4141-A0F3-F4A3BCAB7C15" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html", - "source": "trellixpsirt@trellix.com" + "source": "trellixpsirt@trellix.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3266.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3266.json index 2241d9616af..33a971729ac 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3266.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3266.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3266", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2023-08-14T05:15:10.067", - "lastModified": "2023-08-14T13:06:15.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:19:57.563", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -46,10 +76,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cyberpower:powerpanel_server:*:*:*:*:enterprise:*:*:*", + "versionEndExcluding": "2.6.9", + "matchCriteriaId": "054765FB-5866-4141-A0F3-F4A3BCAB7C15" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html", - "source": "trellixpsirt@trellix.com" + "source": "trellixpsirt@trellix.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3267.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3267.json index f9e3863c635..22284ec0eea 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3267.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3267.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3267", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2023-08-14T05:15:10.133", - "lastModified": "2023-08-14T13:06:15.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:15:46.067", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -46,10 +76,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cyberpower:powerpanel_server:*:*:*:*:enterprise:*:*:*", + "versionEndExcluding": "2.6.9", + "matchCriteriaId": "054765FB-5866-4141-A0F3-F4A3BCAB7C15" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html", - "source": "trellixpsirt@trellix.com" + "source": "trellixpsirt@trellix.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39438.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39438.json index 519c2135679..785cfdaeaef 100644 --- a/CVE-2023/CVE-2023-394xx/CVE-2023-39438.json +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39438.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39438", "sourceIdentifier": "cna@sap.com", "published": "2023-08-15T17:15:12.627", - "lastModified": "2023-08-15T17:15:41.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T17:32:59.287", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "cna@sap.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, + { + "source": "cna@sap.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -54,10 +84,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:contributor_license_agreement_assistant:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.13.1", + "matchCriteriaId": "6EE782C1-8A0C-465E-9D92-CCF68C05AA05" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/cla-assistant/cla-assistant/security/advisories/GHSA-gw8p-frwv-25gh", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39507.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39507.json index f352975757d..491c9ecb21b 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39507.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39507.json @@ -2,19 +2,75 @@ "id": "CVE-2023-39507", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-08-16T09:15:11.793", - "lastModified": "2023-08-16T12:02:41.873", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:54:49.080", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper authorization in the custom URL scheme handler in \"Rikunabi NEXT\" App for Android prior to ver. 11.5.0 allows a malicious intent to lead the vulnerable App to access an arbitrary website." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:recruit:rikunabi_next:*:*:*:*:*:android:*:*", + "versionEndExcluding": "11.5.0", + "matchCriteriaId": "250B11F9-00AB-44BD-8708-F4E6C0AD2F9D" + } + ] + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN84820712/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39534.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39534.json index 743534a43fa..6174636f537 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39534.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39534.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39534", "sourceIdentifier": "security-advisories@github.com", "published": "2023-08-11T14:15:13.240", - "lastModified": "2023-08-21T04:15:09.917", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:11:20.407", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,26 +66,92 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.0", + "versionEndExcluding": "2.6.5", + "matchCriteriaId": "A5F6650B-AD38-4E23-94EC-691A17D787EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.9.0", + "versionEndExcluding": "2.9.2", + "matchCriteriaId": "ACDC404A-DC49-462D-A906-D5B726B5511A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eprosima:fast_dds:2.10.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9255BCA-332A-4107-9A21-95907F1B6F2C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] + } + ], "references": [ { "url": "https://bombshell.gtisc.gatech.edu/ddsfuzz/pcap/fastdds-assert-230509.pcap", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/eProsima/Fast-DDS/blob/v2.9.1/include/fastdds/rtps/common/SequenceNumber.h#L238-L252", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/eProsima/Fast-DDS/blob/v2.9.1/src/cpp/rtps/reader/StatefulReader.cpp#L863", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-fcr6-x23w-94wp", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5481", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-396xx/CVE-2023-39659.json b/CVE-2023/CVE-2023-396xx/CVE-2023-39659.json index f51c2f97de3..d3e35653612 100644 --- a/CVE-2023/CVE-2023-396xx/CVE-2023-39659.json +++ b/CVE-2023/CVE-2023-396xx/CVE-2023-39659.json @@ -2,23 +2,85 @@ "id": "CVE-2023-39659", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-15T17:15:12.930", - "lastModified": "2023-08-15T17:15:41.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T17:32:31.447", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in langchain langchain-ai v.0.0.232 and before allows a remote attacker to execute arbitrary code via a crafted script to the PythonAstREPLTool._run component." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.0.232", + "matchCriteriaId": "BAFE4797-0C2C-4BBF-87A5-8747A3539923" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/langchain-ai/langchain/issues/7700", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://github.com/langchain-ai/langchain/pull/5640", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-396xx/CVE-2023-39661.json b/CVE-2023/CVE-2023-396xx/CVE-2023-39661.json index 4f27bf63313..4cdc3d72ea2 100644 --- a/CVE-2023/CVE-2023-396xx/CVE-2023-39661.json +++ b/CVE-2023/CVE-2023-396xx/CVE-2023-39661.json @@ -2,19 +2,77 @@ "id": "CVE-2023-39661", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-15T17:15:13.133", - "lastModified": "2023-08-15T17:15:41.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T17:32:14.513", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in pandas-ai v.0.9.1 and before allows a remote attacker to execute arbitrary code via the _is_jailbreak function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gabrieleventuri:pandasai:*:*:*:*:*:python:*:*", + "versionEndIncluding": "0.9.1", + "matchCriteriaId": "B20DF392-01BD-403C-B22F-54FD7BF3841F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gventuri/pandas-ai/issues/410", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-396xx/CVE-2023-39662.json b/CVE-2023/CVE-2023-396xx/CVE-2023-39662.json index 15625b8f549..c04819b902d 100644 --- a/CVE-2023/CVE-2023-396xx/CVE-2023-39662.json +++ b/CVE-2023/CVE-2023-396xx/CVE-2023-39662.json @@ -2,19 +2,77 @@ "id": "CVE-2023-39662", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-15T17:15:13.313", - "lastModified": "2023-08-15T17:15:41.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T17:32:00.990", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in llama_index v.0.7.13 and before allows a remote attacker to execute arbitrary code via the `exec` parameter in PandasQueryEngine function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:llamaindex_project:llamaindex:*:*:*:*:*:python:*:*", + "versionEndIncluding": "0.7.13", + "matchCriteriaId": "C4B705CE-A0F1-407E-97A8-CEEC3B2D2C08" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jerryjliu/llama_index/issues/7054", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39945.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39945.json index c25b7e4688d..f932d71ab49 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39945.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39945.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39945", "sourceIdentifier": "security-advisories@github.com", "published": "2023-08-11T14:15:13.363", - "lastModified": "2023-08-21T04:15:10.347", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:12:14.807", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,22 +76,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.0", + "versionEndExcluding": "2.6.5", + "matchCriteriaId": "A5F6650B-AD38-4E23-94EC-691A17D787EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.9.0", + "versionEndExcluding": "2.9.2", + "matchCriteriaId": "ACDC404A-DC49-462D-A906-D5B726B5511A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.10.0", + "versionEndExcluding": "2.10.2", + "matchCriteriaId": "F09F92E5-C333-413D-8D93-E310DE1C6873" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] + } + ], "references": [ { "url": "https://bombshell.gtisc.gatech.edu/ddsfuzz/pcap/fastdds-exception-20230509-02.pcap", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/eProsima/Fast-CDR/blob/v1.0.26/src/cpp/Cdr.cpp#L72-L79", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-2rq6-8j7x-frr9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5481", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40274.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40274.json index e645087a47e..a815d9474ef 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40274.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40274.json @@ -2,23 +2,85 @@ "id": "CVE-2023-40274", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T01:15:47.307", - "lastModified": "2023-08-14T13:06:21.347", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T17:47:49.207", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in zola 0.13.0 through 0.17.2. The custom implementation of a web server, available via the \"zola serve\" command, allows directory traversal. The handle_request function, used by the server to process HTTP requests, does not account for sequences of special path control characters (../) in the URL when serving a file, which allows one to escape the webroot of the server and read arbitrary files from the filesystem." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getzola:zola:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.13.0", + "versionEndIncluding": "0.17.2", + "matchCriteriaId": "046BF830-C166-436E-BB74-0468599AD03C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/getzola/zola/issues/2257", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/getzola/zola/pull/2258", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40296.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40296.json index 8ba4d80b303..eb674294b66 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40296.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40296.json @@ -2,19 +2,77 @@ "id": "CVE-2023-40296", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T04:15:11.467", - "lastModified": "2023-08-14T13:06:15.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:26:40.227", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "async-sockets-cpp through 0.3.1 has a stack-based buffer overflow in ReceiveFrom and Receive in udpsocket.hpp when processing malformed UDP packets." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eminfedar:async-sockets-cpp:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.3.1", + "matchCriteriaId": "8D30067E-9487-412A-BA73-8755F07C5F58" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/eminfedar/async-sockets-cpp/issues/32", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4241.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4241.json index adedcba8167..354e8c89f62 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4241.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4241.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4241", "sourceIdentifier": "cna@cloudflare.com", "published": "2023-08-16T11:15:11.377", - "lastModified": "2023-08-16T12:02:41.873", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:49:18.577", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@cloudflare.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cna@cloudflare.com", "type": "Secondary", @@ -46,10 +76,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cloudflare:lol-html:*:*:*:*:*:rust:*:*", + "versionEndExcluding": "1.1.1", + "matchCriteriaId": "72DD1C49-0716-491B-BAEC-E68BC8E46B64" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/cloudflare/lol-html/security/advisories/GHSA-c3x7-354f-4p2x", - "source": "cna@cloudflare.com" + "source": "cna@cloudflare.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4345.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4345.json index 17677511b77..197f0d9d451 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4345.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4345.json @@ -2,19 +2,74 @@ "id": "CVE-2023-4345", "sourceIdentifier": "cret@cert.org", "published": "2023-08-15T18:15:10.757", - "lastModified": "2023-08-15T19:15:12.000", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T17:26:51.913", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Broadcom RAID Controller web interface is vulnerable client-side control bypass leads to unauthorized data access for low privileged user" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:raid_controller_web_interface:51.12.0-2779:*:*:*:*:*:*:*", + "matchCriteriaId": "E0E02E4F-627F-49C5-867F-E872EC6A208C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.broadcom.com/support/resources/product-security-center", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4366.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4366.json index 7b0e1db2a43..f04d2e19cca 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4366.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4366.json @@ -2,31 +2,123 @@ "id": "CVE-2023-4366", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-08-15T18:15:13.413", - "lastModified": "2023-08-20T03:15:20.187", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-08-22T16:02:51.857", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Use after free in Extensions in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "116.0.5845.96", + "matchCriteriaId": "40820217-BB18-474A-8520-109C1635D656" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://crbug.com/1450784", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5479", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4367.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4367.json index 6e2f0dabf33..c8988deb249 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4367.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4367.json @@ -2,31 +2,122 @@ "id": "CVE-2023-4367", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-08-15T18:15:13.520", - "lastModified": "2023-08-20T03:15:20.297", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-08-22T16:06:22.523", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "116.0.5845.96", + "matchCriteriaId": "40820217-BB18-474A-8520-109C1635D656" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://crbug.com/1467743", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5479", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4369.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4369.json index 662e5537641..4a2abfe2e33 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4369.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4369.json @@ -2,23 +2,95 @@ "id": "CVE-2023-4369", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-08-15T18:15:13.687", - "lastModified": "2023-08-15T18:23:32.150", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:07:52.177", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "116.0.5845.96", + "matchCriteriaId": "40820217-BB18-474A-8520-109C1635D656" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://crbug.com/1464456", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4374.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4374.json index 461e3abe7c0..c047986b9c1 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4374.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4374.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4374", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-16T05:15:10.357", - "lastModified": "2023-08-16T12:02:41.873", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:55:05.483", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -46,18 +46,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:froger:wp_remote_users_sync:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.12", + "matchCriteriaId": "DBE2D2D5-51EA-46A2-94D9-805CC66B870F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-remote-users-sync/trunk/inc/class-wprus-logger.php#L117", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/2946667/wp-remote-users-sync#file130", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e87cfc4-8e7c-47d6-80fc-9c293cdd8acb?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4381.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4381.json index ff17352cd52..9f47514441e 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4381.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4381.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4381", "sourceIdentifier": "security@huntr.dev", "published": "2023-08-16T12:15:13.973", - "lastModified": "2023-08-16T12:16:08.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-22T16:42:23.173", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -36,8 +58,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,14 +78,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:instantcms:instantcms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.16.1", + "matchCriteriaId": "56EF3F9B-6CDB-4568-AF80-EEF6D72B72F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/instantsoft/icms2/commit/58f8b9941b53b606a1b15a4364005cd2b1965507", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.dev/bounties/666c2617-e3e9-4955-9c97-2f8ed5262cc3", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 9eaf17ab0e5..582db567f5d 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-08-22T16:00:33.921146+00:00 +2023-08-22T18:00:42.927137+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-08-22T15:56:12.107000+00:00 +2023-08-22T17:59:25.407000+00:00 ``` ### Last Data Feed Release @@ -40,32 +40,33 @@ Recently added CVEs: `0` ### CVEs modified in the last Commit -Recently modified CVEs: `24` +Recently modified CVEs: `46` -* [CVE-2020-27673](CVE-2020/CVE-2020-276xx/CVE-2020-27673.json) (`2023-08-22T15:16:55.703`) -* [CVE-2021-28038](CVE-2021/CVE-2021-280xx/CVE-2021-28038.json) (`2023-08-22T14:25:33.703`) -* [CVE-2023-32004](CVE-2023/CVE-2023-320xx/CVE-2023-32004.json) (`2023-08-22T14:13:14.530`) -* [CVE-2023-32486](CVE-2023/CVE-2023-324xx/CVE-2023-32486.json) (`2023-08-22T14:19:32.660`) -* [CVE-2023-32494](CVE-2023/CVE-2023-324xx/CVE-2023-32494.json) (`2023-08-22T14:19:54.193`) -* [CVE-2023-24478](CVE-2023/CVE-2023-244xx/CVE-2023-24478.json) (`2023-08-22T14:20:26.980`) -* [CVE-2023-39946](CVE-2023/CVE-2023-399xx/CVE-2023-39946.json) (`2023-08-22T14:21:30.250`) -* [CVE-2023-39947](CVE-2023/CVE-2023-399xx/CVE-2023-39947.json) (`2023-08-22T14:23:13.990`) -* [CVE-2023-40020](CVE-2023/CVE-2023-400xx/CVE-2023-40020.json) (`2023-08-22T14:36:08.510`) -* [CVE-2023-39950](CVE-2023/CVE-2023-399xx/CVE-2023-39950.json) (`2023-08-22T14:40:09.827`) -* [CVE-2023-38687](CVE-2023/CVE-2023-386xx/CVE-2023-38687.json) (`2023-08-22T14:41:23.167`) -* [CVE-2023-29468](CVE-2023/CVE-2023-294xx/CVE-2023-29468.json) (`2023-08-22T14:41:58.630`) -* [CVE-2023-39908](CVE-2023/CVE-2023-399xx/CVE-2023-39908.json) (`2023-08-22T14:42:30.963`) -* [CVE-2023-38840](CVE-2023/CVE-2023-388xx/CVE-2023-38840.json) (`2023-08-22T14:58:17.927`) -* [CVE-2023-32748](CVE-2023/CVE-2023-327xx/CVE-2023-32748.json) (`2023-08-22T15:06:48.240`) -* [CVE-2023-38898](CVE-2023/CVE-2023-388xx/CVE-2023-38898.json) (`2023-08-22T15:07:48.627`) -* [CVE-2023-38915](CVE-2023/CVE-2023-389xx/CVE-2023-38915.json) (`2023-08-22T15:16:26.497`) -* [CVE-2023-38916](CVE-2023/CVE-2023-389xx/CVE-2023-38916.json) (`2023-08-22T15:27:37.117`) -* [CVE-2023-4362](CVE-2023/CVE-2023-43xx/CVE-2023-4362.json) (`2023-08-22T15:33:24.600`) -* [CVE-2023-4363](CVE-2023/CVE-2023-43xx/CVE-2023-4363.json) (`2023-08-22T15:39:35.130`) -* [CVE-2023-4364](CVE-2023/CVE-2023-43xx/CVE-2023-4364.json) (`2023-08-22T15:45:57.573`) -* [CVE-2023-40354](CVE-2023/CVE-2023-403xx/CVE-2023-40354.json) (`2023-08-22T15:55:45.223`) -* [CVE-2023-33013](CVE-2023/CVE-2023-330xx/CVE-2023-33013.json) (`2023-08-22T15:56:05.847`) -* [CVE-2023-4365](CVE-2023/CVE-2023-43xx/CVE-2023-4365.json) (`2023-08-22T15:56:12.107`) +* [CVE-2023-2254](CVE-2023/CVE-2023-22xx/CVE-2023-2254.json) (`2023-08-22T16:43:12.597`) +* [CVE-2023-2225](CVE-2023/CVE-2023-22xx/CVE-2023-2225.json) (`2023-08-22T16:43:29.000`) +* [CVE-2023-2123](CVE-2023/CVE-2023-21xx/CVE-2023-2123.json) (`2023-08-22T16:43:44.743`) +* [CVE-2023-2122](CVE-2023/CVE-2023-21xx/CVE-2023-2122.json) (`2023-08-22T16:44:04.120`) +* [CVE-2023-1977](CVE-2023/CVE-2023-19xx/CVE-2023-1977.json) (`2023-08-22T16:44:31.767`) +* [CVE-2023-0551](CVE-2023/CVE-2023-05xx/CVE-2023-0551.json) (`2023-08-22T16:45:07.637`) +* [CVE-2023-22957](CVE-2023/CVE-2023-229xx/CVE-2023-22957.json) (`2023-08-22T16:45:55.407`) +* [CVE-2023-4241](CVE-2023/CVE-2023-42xx/CVE-2023-4241.json) (`2023-08-22T16:49:18.577`) +* [CVE-2023-30871](CVE-2023/CVE-2023-308xx/CVE-2023-30871.json) (`2023-08-22T16:49:32.083`) +* [CVE-2023-30779](CVE-2023/CVE-2023-307xx/CVE-2023-30779.json) (`2023-08-22T16:49:39.823`) +* [CVE-2023-30786](CVE-2023/CVE-2023-307xx/CVE-2023-30786.json) (`2023-08-22T16:49:51.777`) +* [CVE-2023-39507](CVE-2023/CVE-2023-395xx/CVE-2023-39507.json) (`2023-08-22T16:54:49.080`) +* [CVE-2023-4374](CVE-2023/CVE-2023-43xx/CVE-2023-4374.json) (`2023-08-22T16:55:05.483`) +* [CVE-2023-0058](CVE-2023/CVE-2023-00xx/CVE-2023-0058.json) (`2023-08-22T17:07:19.763`) +* [CVE-2023-22956](CVE-2023/CVE-2023-229xx/CVE-2023-22956.json) (`2023-08-22T17:09:33.733`) +* [CVE-2023-22955](CVE-2023/CVE-2023-229xx/CVE-2023-22955.json) (`2023-08-22T17:09:40.927`) +* [CVE-2023-4345](CVE-2023/CVE-2023-43xx/CVE-2023-4345.json) (`2023-08-22T17:26:51.913`) +* [CVE-2023-2312](CVE-2023/CVE-2023-23xx/CVE-2023-2312.json) (`2023-08-22T17:28:52.263`) +* [CVE-2023-39662](CVE-2023/CVE-2023-396xx/CVE-2023-39662.json) (`2023-08-22T17:32:00.990`) +* [CVE-2023-39661](CVE-2023/CVE-2023-396xx/CVE-2023-39661.json) (`2023-08-22T17:32:14.513`) +* [CVE-2023-39659](CVE-2023/CVE-2023-396xx/CVE-2023-39659.json) (`2023-08-22T17:32:31.447`) +* [CVE-2023-39438](CVE-2023/CVE-2023-394xx/CVE-2023-39438.json) (`2023-08-22T17:32:59.287`) +* [CVE-2023-32006](CVE-2023/CVE-2023-320xx/CVE-2023-32006.json) (`2023-08-22T17:41:28.640`) +* [CVE-2023-40274](CVE-2023/CVE-2023-402xx/CVE-2023-40274.json) (`2023-08-22T17:47:49.207`) +* [CVE-2023-31041](CVE-2023/CVE-2023-310xx/CVE-2023-31041.json) (`2023-08-22T17:59:25.407`) ## Download and Usage