diff --git a/CVE-2020/CVE-2020-288xx/CVE-2020-28840.json b/CVE-2020/CVE-2020-288xx/CVE-2020-28840.json index 9b798f677f3..0a4859134d9 100644 --- a/CVE-2020/CVE-2020-288xx/CVE-2020-28840.json +++ b/CVE-2020/CVE-2020-288xx/CVE-2020-28840.json @@ -2,31 +2,99 @@ "id": "CVE-2020-28840", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-11T14:15:11.103", - "lastModified": "2023-08-11T15:18:06.983", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:17:16.547", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in jpgfile.c in Matthias-Wandel jhead version 3.04, allows local attackers to execute arbitrary code and cause a denial of service (DoS)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:matthiaswandel:jhead:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.04", + "matchCriteriaId": "E3DC2CCE-58F1-405D-B9B1-AAA8C70C88E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-xh27-xwgj-gqw2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/Matthias-Wandel/jhead/commit/4827ed31c226dc5ed93603bd649e0e387a1778da", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Matthias-Wandel/jhead/issues/8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-290xx/CVE-2021-29057.json b/CVE-2021/CVE-2021-290xx/CVE-2021-29057.json index 2649559a9f1..6394bb59be2 100644 --- a/CVE-2021/CVE-2021-290xx/CVE-2021-29057.json +++ b/CVE-2021/CVE-2021-290xx/CVE-2021-29057.json @@ -2,19 +2,75 @@ "id": "CVE-2021-29057", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-11T14:15:12.813", - "lastModified": "2023-08-11T15:18:01.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:39:13.773", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in StaticPool in SUCHMOKUO node-worker-threads-pool version 1.4.3, allows attackers to cause a denial of service." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thoughtworks:node-worker-threads-pool:1.4.3:*:*:*:*:node.js:*:*", + "matchCriteriaId": "947E2D8D-B83E-4069-BB79-493156230791" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/SUCHMOKUO/node-worker-threads-pool/issues/20", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4367.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4367.json new file mode 100644 index 00000000000..0f79c0158b2 --- /dev/null +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4367.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2022-4367", + "sourceIdentifier": "security@wordfence.com", + "published": "2023-08-21T17:15:46.307", + "lastModified": "2023-08-21T17:15:46.307", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** Duplicate, use CVE-2023-4279 instead." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4953.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4953.json index ee860c89149..a630bd48137 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4953.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4953.json @@ -2,15 +2,38 @@ "id": "CVE-2022-4953", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-14T20:15:10.193", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:44:04.883", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Elementor Website Builder WordPress plugin before 3.5.5 does not filter out user-controlled URLs from being loaded into the DOM. This could be used to inject rogue iframes that point to malicious URLs." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,14 +46,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.5.5", + "matchCriteriaId": "675854B7-A3C5-4A34-879B-B7E3C294F35C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/elementor/elementor/commit/292fc49e0f979bd52d838f0326d1faaebfa59f5e", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Patch" + ] }, { "url": "https://wpscan.com/vulnerability/8273357e-f9e1-44bc-8082-8faab838eda7", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0872.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0872.json index eb85ed0dc8a..dbc049a5855 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0872.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0872.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0872", "sourceIdentifier": "security@opennms.com", "published": "2023-08-14T18:15:10.730", - "lastModified": "2023-08-14T18:59:33.233", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:12:20.407", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + }, { "source": "security@opennms.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security@opennms.com", "type": "Secondary", @@ -46,14 +76,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*", + "versionStartIncluding": "31.0.8", + "versionEndExcluding": "32.0.2", + "matchCriteriaId": "62C4B0BB-21CA-40FC-8A39-26B86AA35FD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2020.0.0", + "versionEndIncluding": "2020.1.37", + "matchCriteriaId": "8437D5CA-17AA-4711-8E3D-DFB237B617AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2021.0.0", + "versionEndIncluding": "2021.1.29", + "matchCriteriaId": "19DD5F20-8B2D-4559-AB47-DB4E3CC13DD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2022.0.0", + "versionEndIncluding": "2022.1.18", + "matchCriteriaId": "B33DB38B-B66B-4C3F-B4BE-BA2407E99DEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2023.0.0", + "versionEndIncluding": "2023.1.5", + "matchCriteriaId": "518ACF5B-D2BB-4014-85C5-6F741041370C" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html", - "source": "security@opennms.com" + "source": "security@opennms.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/OpenNMS/opennms/pull/6354", - "source": "security@opennms.com" + "source": "security@opennms.com", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20555.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20555.json index 8065848d2a1..0825dbbde61 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20555.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20555.json @@ -2,19 +2,3755 @@ "id": "CVE-2023-20555", "sourceIdentifier": "psirt@amd.com", "published": "2023-08-08T18:15:11.173", - "lastModified": "2023-08-08T18:33:14.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:56:48.850", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Insufficient input validation in\nCpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting\nan arbitrary bit in an attacker-controlled pointer potentially leading to\narbitrary code execution in SMM.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3300_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_pi_v1_1.0.0.a", + "matchCriteriaId": "213D6541-6584-465F-99C6-4E3DE5B7F8E6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFBFA1DB-2000-4129-A26B-0603FCBCB788" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_pi_v1_1.0.0.a", + "matchCriteriaId": "1240FCBD-614D-4589-BED7-4D4B34C74FCE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_pi_v1_1.0.0.a", + "matchCriteriaId": "57E18F1C-B0E0-4149-AF54-F5154A54AA07" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_pi_v1_1.0.0.a", + "matchCriteriaId": "87AFB048-3A38-4E8E-9AC9-9720EB5E82D1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3700_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_pi_v1_1.0.0.a", + "matchCriteriaId": "B5B69993-9CD5-4580-B231-21A221AD8C22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6275252-9795-4A82-A73D-B5E8FF059E6B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_pi_v1_1.0.0.a", + "matchCriteriaId": "87DBB0A4-28C6-4769-9AD1-6620C3F8A325" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3800x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_pi_v1_1.0.0.a", + "matchCriteriaId": "C2D77D63-B780-469C-9E3B-FC71FC66023F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_3800x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "478A721C-6AC4-40DE-8736-7CF01FC66BBD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3850x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_pi_v1_1.0.0.a", + "matchCriteriaId": "9E3A52CE-6527-47AA-A8EA-F655757E1A4B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_3850x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2073A833-0573-4621-95CA-D889AB35D8DD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3300_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "E33AAFD7-50D6-413B-AAE8-958B437B84DE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFBFA1DB-2000-4129-A26B-0603FCBCB788" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "813F5398-8CBC-4967-AC00-B8A7361138B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "E0F71597-D4CD-47C6-844C-493938552323" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "48810572-F3BC-4618-B3AE-CAA9AB37101D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3700_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "1DC7D33C-AB83-4D73-8445-F8A26ED8BFCE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6275252-9795-4A82-A73D-B5E8FF059E6B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "61208082-98D6-4F64-A840-BB1CD884224D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3800x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "A8087A3F-6110-461E-AFF1-0B4BA74813D5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_3800x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "478A721C-6AC4-40DE-8736-7CF01FC66BBD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_3850x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "3B3F7292-AEEE-4FF7-85E7-46E34D1261D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_3850x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2073A833-0573-4621-95CA-D889AB35D8DD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_v2_pi_1.2.0.a", + "matchCriteriaId": "62B6A49B-9660-4789-A331-B763D3CD5673" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_v2_pi_1.2.0.a", + "matchCriteriaId": "6449F6FA-43F9-4166-822A-12A535362841" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_v2_pi_1.2.0.a", + "matchCriteriaId": "06CED870-9C13-4B57-9EE4-8B21FFE93614" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_pro_5945_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_v2_pi_1.2.0.a", + "matchCriteriaId": "5DB74A10-9CF7-435A-A077-10E3E24E465D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_pro_5945:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AD7AE84-3299-4C99-97A2-4159086FBC61" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_v2_pi_1.2.0.a", + "matchCriteriaId": "F6E36EB8-E6DD-440C-85C6-3AC4F04F6853" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_v2_pi_1.2.0.a", + "matchCriteriaId": "DF3A5389-C5C4-4A76-8651-7F71357651E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_v2_pi_1.2.0.a", + "matchCriteriaId": "79FBF941-E2A0-4706-8DAC-1381F30F2DCC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_v2_pi_1.2.0.a", + "matchCriteriaId": "0F8AC497-614D-4C6B-820D-E9F51FD9D669" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_pro_5845_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_v2_pi_1.2.0.a", + "matchCriteriaId": "1856E921-F22A-46A0-B7DE-82A937EECEC7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_pro_5845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "342D9BCB-5C64-426E-8546-7D38C4DE6288" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_v2_pi_1.2.0.a", + "matchCriteriaId": "BB0E5FAB-94BA-4310-BCE0-432CCEE348C6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600x3d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5423F6D1-DA8B-4960-B87B-FA03C3539EDD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_v2_pi_1.2.0.a", + "matchCriteriaId": "C3DAD6B7-8B57-481B-B351-27CA045B82C9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_v2_pi_1.2.0.a", + "matchCriteriaId": "00E67E11-211C-4E19-AEAC-58DF780EBB18" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_5645_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4_v2_pi_1.2.0.a", + "matchCriteriaId": "F9E5475A-103D-4654-A5A4-228BDAFE80B9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_5645:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE0D0239-0550-4B9C-9342-916B5462F791" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5700_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "5836A8D4-AF2D-4F87-8D99-E35DB33D9EF2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3CA3FBA-9DA5-4515-8911-DD8BD4C74A2A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "9BC6E130-8F9A-4B1A-82C0-1862E4D2E0C8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5100_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "BBFD10F9-E8ED-4C29-AE2F-AEED7333CDF5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8576A19F-AC8F-457B-8EA5-651B552ED0F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "BDF18FC1-4587-4FFB-8246-70A83EBF4AE3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "12019E42-1DFA-44EC-A0B6-5A543F57C937" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "9A433FC0-3593-41CA-8468-FE00F7512E45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "947E2A65-188F-4AFF-8701-77AC69D778E6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "ED35C2C7-D384-4BCB-AC94-A7C5490B26C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "ED71DA2E-5F62-4D87-A948-E5E8FF9B06ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_7950x3d_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.0.6", + "matchCriteriaId": "C77CA5DE-1280-4948-A887-BFF8984FD690" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F05C8669-6348-4A1B-B1D4-D22022E1F67E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_7950x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.0.6", + "matchCriteriaId": "B8F38718-A9F4-44EB-9236-A8133DA320B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD6C7D37-C94B-4301-8C0A-5A00B3569D6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_7900x3d_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.0.6", + "matchCriteriaId": "ACF40184-3511-4D99-A9A3-EB949C0875B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86CAA682-9666-4929-B1AC-D9DB3109DB1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_7900x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.0.6", + "matchCriteriaId": "7FEA6ADB-1679-49BE-8DE1-2D2673693DE3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA666DF3-C5F3-4127-A8EE-B784DD41F642" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_7900_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.0.6", + "matchCriteriaId": "AA18BAD8-10F7-42DB-B3D6-70AEA9091BDD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5602B902-9FDB-4946-BE4C-236262285F2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_pro_7945_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.0.6", + "matchCriteriaId": "EC64A590-9F6C-43C3-8B94-081529C325F5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3DE32CA-168F-4812-AEAE-D771EB01E15D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7800x3d_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.0.6", + "matchCriteriaId": "B898102C-4DBD-47EF-99E0-7C2D6DF7F616" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA6CD984-A8C7-4B23-8FF9-896C503EBA37" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7700x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.0.6", + "matchCriteriaId": "DE956E3B-10B1-4327-8206-092D1480A70B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "225E8405-04FF-4885-92C8-8581ACC66E06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7700_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.0.6", + "matchCriteriaId": "EC6357B1-B9C4-4636-A062-04E3E278422E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76121981-8DC2-4779-833E-4B15CFCF7FC3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_pro_7745_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.0.6", + "matchCriteriaId": "92AF32F3-E5FC-4245-8D1C-9B272C4DEDBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00DEBFA8-6007-4EAE-AD11-6D477ADE4E63" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7600x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.0.6", + "matchCriteriaId": "A041CCD5-48D4-47C6-A3E7-3C109BC0EB8B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C05D51F-469D-487D-9FC8-E1AD699A6F74" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7600_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.0.6", + "matchCriteriaId": "30E89266-D795-41D3-8474-967F19FB0BF0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6740A06F-4512-427D-9CB9-A4A6DB046BA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_7645_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.0.6", + "matchCriteriaId": "D91EE8B4-EA9B-43EA-B5C0-F4E370FF75A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D2787C72-42D5-42B0-BE5B-E548B319BCF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7500f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.0.6", + "matchCriteriaId": "9449A37B-A41C-4AE7-ADF6-84818B91B9D1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1232B034-1214-4F9A-823D-DC76D5C5956B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_4700s_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "28288080-DDD2-40AE-ABCE-1847B18B7CBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_4700s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C1D755E-9826-42EA-AA8C-B955BF1F9A90" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_4500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "84991B65-237D-4604-8CB3-E3243DF77370" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_4100_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_pi_1.2.0.a", + "matchCriteriaId": "D3EA61F4-2D3A-45E0-9F3E-61F9ADB986BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "263E53BD-7A57-40AC-8A35-D761BD3895A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4piv1_1.0.0.a", + "matchCriteriaId": "2C455922-830C-49A4-9FA9-9A90B06B6D6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_3150ge_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4piv1_1.0.0.a", + "matchCriteriaId": "015AD945-5139-4C42-A7B4-7CCE72D5C7C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_3150ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11D12DB6-A9E9-4BEA-BC80-D6672A3383CD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4piv1_1.0.0.a", + "matchCriteriaId": "3C19D8EF-15AA-47A5-99D6-C395A7948364" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4piv1_1.0.0.a", + "matchCriteriaId": "1A4A7FA6-9EA6-4000-8694-B756599DDFA6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4piv1_1.0.0.a", + "matchCriteriaId": "D949C37E-BB91-4373-84F7-2E4E5D8ECBC7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_1.2.0.a", + "matchCriteriaId": "6A16BE9F-CBE7-4D65-9345-D78BBF0A3DAF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_3150ge_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_1.2.0.a", + "matchCriteriaId": "D697E3F1-545E-46B9-A36F-2AE64E32E135" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_3150ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11D12DB6-A9E9-4BEA-BC80-D6672A3383CD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_1.2.0.a", + "matchCriteriaId": "B0D94740-2966-4576-ADD0-8D0D42DB54FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_1.2.0.a", + "matchCriteriaId": "4F1F54F7-AAC9-4CB1-9A1D-F9AB8911BA9B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2_1.2.0.a", + "matchCriteriaId": "3F728FCC-BDAF-4437-ACD4-4525DAC1D919" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "0F41AFB0-7C0E-4E86-A78F-6BA556E2DB86" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "F89578C0-B62C-4417-90AC-74EB55640574" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "C5F922F9-AE58-410B-BEB6-04815CF82BC0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "6D91D738-8474-4024-99DA-1C211C11BE0E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "CA642427-46AA-4D53-8E6F-E312DE4DEC55" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "617C92AE-E3EE-4B07-B6FD-0B5E7FC321F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "390C1928-7447-46FF-BD3E-B475C2D54AB4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_3015e_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "pollockpi-ft5_1.0.0.5", + "matchCriteriaId": "F212FBEB-30FE-4066-B600-BC6F0FE28D9A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_3015e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7806F15-EEF7-4C0B-9CBE-1DAB80213FC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_3015ce_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "pollockpi-ft5_1.0.0.5", + "matchCriteriaId": "CD62780D-D099-48E5-8090-005B7EDAEA67" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_3015ce:-:*:*:*:*:*:*:*", + "matchCriteriaId": "31190A28-6142-4502-BD95-FD3792BED505" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "AF80DAC8-7FA6-45EB-9C8D-C9F5BDBBEF58" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "48F14A29-C7BE-41F3-BC3B-4268CC6E3467" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "10A50066-3EBD-4F45-9A9B-8FBA2546535A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "BE48CDD3-F724-44D2-AEEC-C50179C6A689" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "6193D48A-B6F2-4DCA-AF6D-F443732A1E71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "163BCBAA-6F43-44F0-90C0-04F26727A023" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "702CCF71-C813-4A94-A7D8-59233564928A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "FCF99052-F798-4B25-BA0E-87077D19BA5F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "51B7948F-030E-4C28-96AB-4F4DB052CFA3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "D7AF3EE1-76EC-4611-835E-4D35007A344B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "picassopi-fp5_1.0.0.f", + "matchCriteriaId": "D0222A7F-2103-497E-A027-CA15ABABE6BB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_4900h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "renoirpi-fp6_1.0.0.b", + "matchCriteriaId": "E130EE71-CAE1-47F3-B73C-5AC9BBF091D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_4900hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "renoirpi-fp6_1.0.0.b", + "matchCriteriaId": "785185A7-52E7-4D07-801F-92E1D417C4E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_4800h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "renoirpi-fp6_1.0.0.b", + "matchCriteriaId": "A1F3D6ED-8D38-4493-90A8-6A3569090E99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_4800hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "renoirpi-fp6_1.0.0.b", + "matchCriteriaId": "E167937E-F419-4ED0-80F7-E1160ED871D0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "444F83B8-ABD0-401C-8028-CAF0DEECF7BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_4980u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "renoirpi-fp6_1.0.0.b", + "matchCriteriaId": "8F23F6EB-5746-4290-8E29-693E65E33FAF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_4800u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "renoirpi-fp6_1.0.0.b", + "matchCriteriaId": "735EBD69-B0CB-4736-B67C-F23B7C7F5F33" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_4700u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "renoirpi-fp6_1.0.0.b", + "matchCriteriaId": "22C302C3-9ABF-4278-8AF3-BF55C8F94FEB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_4600h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "renoirpi-fp6_1.0.0.b", + "matchCriteriaId": "116E4CDF-ABD2-40ED-B088-A3E3EE8F3CEF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_4600hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "renoirpi-fp6_1.0.0.b", + "matchCriteriaId": "B62B699D-0BE7-4C51-B280-5A8AB4DF69D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "510FB098-A28C-46AD-9244-438DC828A007" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_4680u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "renoirpi-fp6_1.0.0.b", + "matchCriteriaId": "1810F96C-7567-4F71-B3AA-3B860C6F8178" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73A4079E-01E9-4807-A293-F6E843752554" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_4600u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "renoirpi-fp6_1.0.0.b", + "matchCriteriaId": "AF7FC47A-9D8B-425A-85F8-CDDECB6A63F9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_4500u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "renoirpi-fp6_1.0.0.b", + "matchCriteriaId": "263DBEE0-67A4-48C9-B2C4-87305B298087" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_4300u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "renoirpi-fp6_1.0.0.b", + "matchCriteriaId": "EAE62C8F-A871-40A3-A26E-BB08A01269C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "9A814D47-5020-41F4-BF76-4C5B9DE49AD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "32B3F31B-BD20-4469-97AF-9D6BE7E9DCE7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "3B0F0640-4A30-46D6-AD20-9581A087F073" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "03B6C9FD-2556-41D0-82DC-08695FB116F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "A200076A-7F83-4D33-9B87-81D025D22B40" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "862854ED-2156-45C6-80E9-8149506E1292" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "E6685DAE-899D-4F60-A8BA-F2522CB0112D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "57348F62-A7BF-4F39-9A16-4E0447C08BC0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "DD90B4BE-5792-40B3-96B1-685362FDF2D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "23023A6D-D74F-42E3-99AB-8E05028A65F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "7CCD57EE-0653-47B1-B205-1E50AE1BE116" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "777B7FB7-2A5C-4D46-82C4-9AAA3285366B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "97AF5F46-CDAF-402A-84D4-7339CE7CFF84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "A6A6BF07-0509-431D-97D8-6163A42097F0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "94AF637B-ADEF-4E8F-8202-DB5E73F9CF0E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "135BF183-190E-4BFA-B211-EB2C8A4F0B34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "49666325-3C49-4C7A-8637-F4E09756CBB7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "86A83F95-7556-4BF0-8679-CA6052271A0C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "7301D2A1-4794-49C9-888D-92CE7016A7C0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_6980hx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8", + "matchCriteriaId": "7AAC3E8F-ADF1-4D65-A30B-47C599DF9482" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3674D656-9623-4B39-AADE-158FE70FF29F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_6980hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8", + "matchCriteriaId": "52C4DB50-FBCD-4AA2-B852-DDCC28E07899" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B21FB338-F944-40F9-8F0C-99B471AAD51E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_6900hx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8", + "matchCriteriaId": "4F3C7FEE-0EC3-4F7E-B47E-FD05AFB4A560" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_6900hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8", + "matchCriteriaId": "59E59A79-F3B5-4245-80B6-33A33CA7A8ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_6800h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8", + "matchCriteriaId": "A8DC77A7-188C-4B70-8911-42AE99317D3A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09B085FF-EAEA-42BC-BA60-3AA9B76141B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_6800hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8", + "matchCriteriaId": "36449E08-8C84-4A4E-94C1-931168DD7D58" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "760F20CC-9034-462C-A25E-C009E2218C38" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_6800u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8", + "matchCriteriaId": "9ADB9D1F-CDD0-47A0-B9DB-7583C016A3A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D2CBCEA-AB4F-444C-9CCD-A976003F796C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_6600h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8", + "matchCriteriaId": "CF3BB316-46FC-4602-9688-01407B4BE664" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D260012-5D8F-4B36-8B88-82DB0291EE9D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_6600hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8", + "matchCriteriaId": "13D2701F-9E74-4242-B740-2EC1A1AF509A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_6600u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.8", + "matchCriteriaId": "21A5E589-7C8C-4359-8368-1BF129955E43" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "025E494E-953E-426E-BE89-6F2360A3AAC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7520u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "mendocinopi-ft6_1.0.0.5", + "matchCriteriaId": "A957C081-D292-4AED-8C76-AFE0F897E278" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0870FBE4-92B4-4717-88B0-EC1094268034" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_7320u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "mendocinopi-ft6_1.0.0.5", + "matchCriteriaId": "C87C1466-9FA4-446F-B68E-D6470476ED34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "48F04B9F-8C65-476B-B5D8-18CC96E3B712" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_pro_7730u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "DA28D46E-DFFA-4E18-8F78-1B02625B78A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7730u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29805A0A-1E52-4545-9D41-B9A1EE571778" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_7530u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "07729CB8-EFD3-4F1E-B5A8-6B430D4D3DF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7530u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C822A153-C32B-423B-8660-EAE0A1DEB4EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_pro_7330u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.e", + "matchCriteriaId": "3BD61575-84EE-4515-B532-F7492722FDFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_pro_7330u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86704116-43D0-47FD-8896-AB00C265AAE0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4003", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20569.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20569.json index 020a1086a4b..1f65171b49d 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20569.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20569.json @@ -2,51 +2,4109 @@ "id": "CVE-2023-20569", "sourceIdentifier": "psirt@amd.com", "published": "2023-08-08T18:15:11.530", - "lastModified": "2023-08-16T03:15:26.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:26:07.933", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "DA80E2CA-F643-4181-B64C-BFD012DE1EEC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "59044C37-26AE-4F1E-922A-E220CE4884BB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "A5BD9C12-1B7B-4213-906C-0F20EE02686C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_pro_5945_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "E0FC666B-47C6-4EAD-8399-5DE3469D5157" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_pro_5945:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AD7AE84-3299-4C99-97A2-4159086FBC61" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "9B633C0D-5FB9-48AD-A512-FF65477B3135" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "EB4906EF-7250-43D4-A3BB-E7025179BF04" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "50117943-6DEA-41DE-9695-A45BBFB99D8E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "A8F12A2D-4CFF-4AAD-B6A8-54585F2B9043" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_pro_5845_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "8BDF36B9-B57F-44FE-BEE7-43069B2D2CD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_pro_5845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "342D9BCB-5C64-426E-8546-7D38C4DE6288" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "68406DC8-5B8D-4A89-9B4D-F3CB9E25B032" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600x3d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5423F6D1-DA8B-4960-B87B-FA03C3539EDD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "23CD69BD-F783-4151-9B03-A62E9400D116" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "75A74A3D-FC39-46B9-A544-1E5A51B05351" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_5645_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "D58647F0-4E83-4857-A49A-E1CC1450BEB8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_5645:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE0D0239-0550-4B9C-9342-916B5462F791" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5700_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "C94E09E7-7699-47D0-814B-E01D7FEABCF5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3CA3FBA-9DA5-4515-8911-DD8BD4C74A2A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "EB1E8B8A-649C-4C2F-A8E1-C39815512F2B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5100_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "1E04578E-7580-463F-BAB0-49A9ECF048C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8576A19F-AC8F-457B-8EA5-651B552ED0F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "7E77C9FB-419C-4AFB-83C0-D3BEE8C372D6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "10F0BE72-B95C-45FA-92CF-7976B96A31F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "491AF1F4-1807-4536-ABC3-FD2F9FB94C70" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "89B72122-7F69-4541-831D-17360565E6B9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "DACCE645-BF3D-45CF-A1F7-7157CCA4FFD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam4v2pi_1.2.0.b", + "matchCriteriaId": "4027487A-01D9-47D1-8467-B8390B95935D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_7950x3d_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.8.0", + "matchCriteriaId": "773D55A1-8EB8-4C16-91F9-6EB953AD5952" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F05C8669-6348-4A1B-B1D4-D22022E1F67E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_7950x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.8.0", + "matchCriteriaId": "4D5BE0C1-1ACC-4CEF-849A-5916B2AE2B1F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD6C7D37-C94B-4301-8C0A-5A00B3569D6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_7900x3d_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.8.0", + "matchCriteriaId": "ECFFC31E-CD28-42E6-8FAD-F6349D6EF9A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86CAA682-9666-4929-B1AC-D9DB3109DB1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_7900x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.8.0", + "matchCriteriaId": "1FCB0B5D-5D10-4AA0-AB8E-EB10D2590C3B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA666DF3-C5F3-4127-A8EE-B784DD41F642" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_7900_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.8.0", + "matchCriteriaId": "E2A5832B-E4EF-439B-999B-28F9EB1500D1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5602B902-9FDB-4946-BE4C-236262285F2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_pro_7945_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.8.0", + "matchCriteriaId": "24FC993D-CBBE-424D-92FB-5F8BE029EF85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3DE32CA-168F-4812-AEAE-D771EB01E15D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7800x3d_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.8.0", + "matchCriteriaId": "1C67DA4B-EFFA-4C1C-AA92-6942D963A9B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA6CD984-A8C7-4B23-8FF9-896C503EBA37" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7700x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.8.0", + "matchCriteriaId": "83012AC9-9A24-469C-8B7E-741B14D7379D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "225E8405-04FF-4885-92C8-8581ACC66E06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7700_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.8.0", + "matchCriteriaId": "B92B0C31-572D-4FE0-AA5C-5E40ABC9CA45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76121981-8DC2-4779-833E-4B15CFCF7FC3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_pro_7745_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.8.0", + "matchCriteriaId": "87ECCD10-31FB-45BB-AED9-9C94E714B799" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00DEBFA8-6007-4EAE-AD11-6D477ADE4E63" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7600x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.8.0", + "matchCriteriaId": "895B3038-56A8-4E59-BC9D-E8568B2FF4BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C05D51F-469D-487D-9FC8-E1AD699A6F74" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7600_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.8.0", + "matchCriteriaId": "5C9554CF-9FAE-4F4B-AD61-7AC50A289B5A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6740A06F-4512-427D-9CB9-A4A6DB046BA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_7645_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.8.0", + "matchCriteriaId": "BAE63027-A73F-43E6-B667-44F3B8D120B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D2787C72-42D5-42B0-BE5B-E548B319BCF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7500f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "comboam5_1.0.8.0", + "matchCriteriaId": "FACBACEC-0BD8-4E74-93E4-4AC4CF193290" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1232B034-1214-4F9A-823D-DC76D5C5956B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "chagallwspi-swrx8_1.0.0.7", + "matchCriteriaId": "E47DE060-45D0-4703-B9FD-D45E90276B66" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "chagallwspi-swrx8_1.0.0.7", + "matchCriteriaId": "815DEC82-52E2-4CAB-88E3-FF00E35D0A20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "chagallwspi-swrx8_1.0.0.7", + "matchCriteriaId": "E576F58F-4E66-4EF4-8E69-71F94D34955C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "chagallwspi-swrx8_1.0.0.7", + "matchCriteriaId": "B0FA0121-4245-483C-AEDE-4F3EDFD49E52" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "chagallwspi-swrx8_1.0.0.7", + "matchCriteriaId": "A57E99DA-DFB6-4D64-AA53-28209E47039B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "45AB5F8E-1357-498B-B86C-676E7E8D1D60" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "24A0A2C9-8B74-4AEF-8BC7-157B1BEF4B8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "B6405E0B-FC0A-440E-B59A-8234883C1BA1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "44A1DB8C-EEE4-40E6-A5F1-B0969DCEFC70" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "35954F0F-8BCF-4070-B89F-CD96993909C2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "AF79D918-2FFD-4ABA-AF94-57338B9C742C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "0A2C3D9A-4DD0-4538-B248-CD2A90FC0198" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "075717AC-01F7-4FF2-94CA-C49EEA15ACA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "9E24CD07-3BD0-45EA-BEC7-1FD74914DB67" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "D2BD1F51-6D87-4D1E-A67A-09E42185B108" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "5A75B064-737F-4750-817B-A46244C60EF0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "1638CF0C-047A-45D0-B522-E022055A5C1B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "35D5BE39-5678-4742-8545-4B77F638933A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "5FCD9CE1-26B7-4589-93C8-800543FCCA1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "3B2E0FA6-17D1-4F31-8BBA-D799B6193A72" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "691CF38C-BE0A-41B6-B0D9-555C3889F375" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "2DBA2870-E8E3-40E8-9CE3-2D4E0AA7689D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "E5E06C18-3F26-4FBB-929E-CC3FC5E430BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "367AB427-A2E0-4AAA-898D-051E37021A33" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_6980hx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", + "matchCriteriaId": "CDFD9B8E-8321-443D-9887-E79D5F5DF25C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3674D656-9623-4B39-AADE-158FE70FF29F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_6980hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", + "matchCriteriaId": "17D72983-2F49-4B46-8627-129823FBF0FA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B21FB338-F944-40F9-8F0C-99B471AAD51E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_6900hx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", + "matchCriteriaId": "B1DA08DC-16C4-490B-9041-748328303C92" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_6900hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", + "matchCriteriaId": "D1C64DE1-DEAB-49AB-9586-705C8789F898" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_6800h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", + "matchCriteriaId": "A1638E21-FA6B-43BB-A852-745B7E3E2D57" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09B085FF-EAEA-42BC-BA60-3AA9B76141B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_6800hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", + "matchCriteriaId": "AE87BC83-9726-48D6-9B3F-3907D0A85D58" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "760F20CC-9034-462C-A25E-C009E2218C38" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_6800u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", + "matchCriteriaId": "F740D54E-289F-4812-9BDC-88F0EC73EBB4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D2CBCEA-AB4F-444C-9CCD-A976003F796C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_6600h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", + "matchCriteriaId": "B3470DDF-5647-48B8-9576-41DEC0793377" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D260012-5D8F-4B36-8B88-82DB0291EE9D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_6600hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", + "matchCriteriaId": "381CDFB7-F091-4EA8-8850-71BE1387F246" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_6600u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", + "matchCriteriaId": "179F30A4-958B-4857-B11D-6FD0A2F6D1BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "025E494E-953E-426E-BE89-6F2360A3AAC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7735hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", + "matchCriteriaId": "8383A5AC-6870-4DC4-BE3E-39298B5972C3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7736u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", + "matchCriteriaId": "70EB1DB9-C6DB-40B4-BC68-087A90D7EBB8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D50E8EA-ECB2-463D-BA51-D13CF5A02266" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7735u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", + "matchCriteriaId": "32E4310D-A980-465C-9DF2-2EE5D93FEDA3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7535hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", + "matchCriteriaId": "1893BB4F-77A6-4048-AEAA-61C92958C32B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE36D471-57BF-4385-A825-029F7313E4DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7535u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", + "matchCriteriaId": "5A9C8A16-B6D4-4F6D-AB3E-C1EBE4F56512" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "082BE536-F29C-4A73-B030-A19DD3A448B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_7335u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "rembrandtpi-fp7_1.0.0.9a", + "matchCriteriaId": "24D61C84-9AEC-400B-AAA5-C8F5AF5D021C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "495E436C-B0EE-4B72-AB49-332F4752C140" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_pro_7730u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "50ED8913-F725-4A67-84B6-9F0F0B636F5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7730u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29805A0A-1E52-4545-9D41-B9A1EE571778" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_7530u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "8D5FD5DB-D500-442B-B1AF-BCB88F3FF978" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7530u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C822A153-C32B-423B-8660-EAE0A1DEB4EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_pro_7330u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "cezannepi-fp6_1.0.0.fa", + "matchCriteriaId": "31A63A5D-1495-404D-820A-D16CB89A63CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_pro_7330u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86704116-43D0-47FD-8896-AB00C265AAE0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_pro_7640hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", + "matchCriteriaId": "E339576E-062A-4C93-AA5D-1F8E0E2ED693" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_pro_7640hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D306FF3F-87D0-48BF-93EA-733896DBB8A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_7940h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", + "matchCriteriaId": "76F008FC-D32F-4923-93FA-23B00E2E88BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A7E6806-A7AC-4C96-960B-B8934CEA2439" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_pro_7840hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", + "matchCriteriaId": "E28301E7-9423-4E2B-8E8F-FE05B760F35A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8480A7E0-882C-4B03-ADBC-697304B0B7C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7840h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", + "matchCriteriaId": "9F55A6F8-E8C1-4DEE-BCCA-BC86748409C9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D2D0429F-F186-4F78-9AE0-574E3A39926D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7840u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", + "matchCriteriaId": "3EC28C1E-9EA4-40E5-9493-620277FB6B40" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6C9E9BB-CD95-4D1E-914C-B705C1B0D8B2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_7640hs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", + "matchCriteriaId": "53225D2B-EAE1-4772-A8FC-2AE107B20836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E3657C6-1047-4CA9-8D44-C7143F7D877D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7640h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", + "matchCriteriaId": "C7030541-E143-4885-B24D-ECE18FBC2B16" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BBC1EFF4-FED3-4583-84D3-E7BFC1FE53B8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7640u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", + "matchCriteriaId": "877037A7-FDA1-4147-BAEC-228E25A177DD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BC5E111-A7AA-4A45-A2E3-47013F9135D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7540u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", + "matchCriteriaId": "532D67C0-B127-4F99-9D0C-8F7CDD71FEA0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7540u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36699723-8BD8-4D9F-B5E1-DE7ACF9A6D57" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_7440u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "phoenixpi-fp8-fp7_1.0.0.2a", + "matchCriteriaId": "584DA20B-8E0B-4572-9134-5F7E47D99190" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C4FDE72-050C-4A72-A4F4-9C1D5273CADD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_7945hx3d_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "dragonrangefl1pi_1.0.0.3b", + "matchCriteriaId": "4862DE44-922F-4983-B7BE-6CB80B7CD0A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82CCEE11-392D-4486-A6AD-CB64FB8B7081" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_7945hx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "dragonrangefl1pi_1.0.0.3b", + "matchCriteriaId": "B152085B-B26F-4A19-A450-85E15781FBED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74DD4A40-B712-4B54-9CC7-0BFD79E917BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_9_7845hx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "dragonrangefl1pi_1.0.0.3b", + "matchCriteriaId": "312F52E6-0224-4B9A-BAF2-047F7230B871" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD27234D-ACFC-4144-8980-2B706822C579" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_7_7745hx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "dragonrangefl1pi_1.0.0.3b", + "matchCriteriaId": "6506B081-C9F6-4C13-85D0-341B5E6C35C3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69289284-2ED2-4D8B-8AE2-B835AAF31EAD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_7645hx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "dragonrangefl1pi_1.0.0.3b", + "matchCriteriaId": "717556C1-D45C-4C71-B5C8-6D90CF9A8432" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB5D5B25-F32A-493E-BD54-57098981E15A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "7DC71137-5861-4413-AE37-FBA5EA15CD84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "BB947EC3-B3CF-4E35-86C1-DDD831D4518D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "6FB9F211-8998-44FF-91FE-723BA6315B85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "B3A4256B-4211-4A15-B33C-743A4898CB76" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "4DCADA15-DE56-4993-977D-5BE701476D46" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "FF7D4F3A-CE7A-4C84-B872-E1206912AD62" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "AFEA67F1-83B8-461D-8066-91BBD3FD9E24" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "B86A8C8F-BEFC-439B-A712-E931CC229708" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "21ED479B-BDA8-4DB2-81C6-F0D6576C2C95" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "6651DED0-FD67-406B-845A-553ABBBCCB02" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "025B7A4B-0CF9-401E-AF18-3581CD04BDB5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "32AB0DD3-0FDA-4D70-9EB2-F1A03B5B6D92" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", + "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "F64D3037-AC84-411D-AF23-2B6E49C26896" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "AFE24E16-5219-4DF1-9722-BCB9B5BEFAC4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "AA1D5CD3-8E14-4E55-8D7C-10E8DBCA6418" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "1FBC1FE8-F91B-407A-B4DC-C3EE38676828" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "00B84AD1-3F32-46B5-88D1-50CE43844977" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "10654574-BACF-41D7-8B2D-73E2E0CBFBFB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "CCC29525-306B-4E29-A846-8439487042D6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "77DA95C1-908B-4AAA-88AD-6D3AA1E4DCE0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "6EC6AF23-8DE0-4402-B707-F9DC3E83B906" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "C45FD0CE-4B69-4C95-9EA1-575736A55045" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.c", + "matchCriteriaId": "AEDA7A65-34F0-454C-9040-A7024DB82D6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "46DA46A4-B52A-4DE2-9D15-A6CFA8100626" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "4B65F0EE-B8BD-47C1-B018-40304328111E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "38872F0B-9FEC-4FFF-B23A-0363563B363D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "CCB8097F-A467-4F0F-A4A9-DBDC1A8D64E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "763B1559-1F1F-499E-AA99-3D985FE29B30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "C0552FCA-39A4-440C-974D-58DA3B7DA1A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "22CAB170-3ED4-4D5E-8B3B-CE8D4BA9B3D5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "2B66B44E-2DEC-46C1-9083-C0E27FCE9B7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "59B9F850-7916-4CBE-B823-9933A726B345" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "C7B16A0E-1188-4FD9-9E69-B8F4DD33ED3D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "71545221-A01F-4C17-A3FA-C124137212AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "1C3CEB6D-0B14-44AA-87B5-1FDFDEC1F8A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "D1F9F957-1FA8-41D5-B9BC-429B217DCBBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "CBBA0738-1981-4E82-90C8-676C50404E21" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "3AA7824A-CDDF-49FC-8982-86BD72EBF93E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "C7634433-80B0-4007-A968-FE6210F13981" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "6D2A24DF-73EB-47DA-AE17-727743CF1F77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "0DAD9B0E-BFA4-447F-B24C-A0BA9325F20C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "DADD9549-3769-4F4A-A898-9BDFF892A8F5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "40A82ECB-1839-4DD5-AC35-E0D598790900" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "ABA02A3E-81B9-4A81-BE29-C4A829B13BC3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "D548FCE5-7B25-490C-B777-1202EA6F18E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "742306EC-A9CB-43C4-BC82-4E657FB38623" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.9", + "matchCriteriaId": "C0060C2B-DD7A-4886-859A-5A6FCEA9A758" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2023/08/08/4", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://xenbits.xen.org/xsa/advisory-434.html", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://comsec.ethz.ch/research/microarch/inception/", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5475", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20586.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20586.json index c1d6403519f..f429be96faa 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20586.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20586.json @@ -2,19 +2,74 @@ "id": "CVE-2023-20586", "sourceIdentifier": "psirt@amd.com", "published": "2023-08-08T18:15:11.593", - "lastModified": "2023-08-08T18:33:14.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:25:49.017", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "\nA potential vulnerability was reported in Radeon\u2122 Software Crimson ReLive Edition which may allow escalation of privilege. Radeon\u2122 Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amd:radeon_software:-:*:*:*:crimson_relive:*:*:*", + "matchCriteriaId": "1B9B57CB-1D5E-4FE9-B03D-315A9B54650A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6007", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20588.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20588.json index e7be7717fb9..84f4e2da863 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20588.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20588.json @@ -2,23 +2,918 @@ "id": "CVE-2023-20588", "sourceIdentifier": "psirt@amd.com", "published": "2023-08-08T18:15:11.653", - "lastModified": "2023-08-19T18:15:22.973", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:24:22.070", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.\u00a0\n\n\n\n\n\n\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-369" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", + "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", + "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7571_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99013A91-F504-4EB4-8904-7E551573AF49" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7571:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3CF0651-A320-40D1-986F-D2790488929E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", + "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40933267-3CEF-417E-BE95-37B562F37E78" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9724784-3A56-4175-9829-796CF687CA09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAFFAD03-CEE3-4C35-B6D2-627004A22934" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "926812AD-94F0-4CB8-9890-EAB11FDC1804" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_3200ge_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2BB6B36-892D-434B-B590-6BEAFD4037BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_3200ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A9E5D46-DB87-4420-9AC6-2ABCB0119E01" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF105508-6252-4101-92B5-ECA9022D4720" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BE83C48-571F-4BD6-ABE3-2B14ED510D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52DFA8C8-AD16-45B1-934F-AEE78C51DDAC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_3150ge_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9832717E-8322-4548-B6C7-DE662D2B05AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_3150ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11D12DB6-A9E9-4BEA-BC80-D6672A3383CD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D689C088-F1F1-4368-B6AE-75D3F9582FB1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD375C2E-B976-4DAE-BF89-EFED1482DB28" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "420E8314-35B8-4A12-AD42-3914EBA51D4D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_silver_3050ge_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50F48D3D-C024-45F8-A299-322FB62EF6F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_silver_3050ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD0332AB-3568-4AF7-9738-3CF2923C6DDA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_silver_pro_3125ge_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D7122B9-4664-492C-8440-CE0C0AADAD4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_silver_pro_3125ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "368AD9F8-E7E3-4316-9671-7305FDD3D285" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5480", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21274.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21274.json index 6b8801c7224..4c1c2d06fc2 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21274.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21274.json @@ -2,23 +2,92 @@ "id": "CVE-2023-21274", "sourceIdentifier": "security@android.com", "published": "2023-08-14T22:15:12.823", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:42:55.323", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In convertSubgraphFromHAL of ShimConverter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*", + "matchCriteriaId": "F3B54CC6-C4CB-4BBD-AADC-BC7A80F4F621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/NeuralNetworks/+/2bffd7f5e66dd0cf7e5668fb65c4f2b2e9f87cf7", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-08-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21275.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21275.json index 033ac2189d1..6f11656d56f 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21275.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21275.json @@ -2,23 +2,93 @@ "id": "CVE-2023-21275", "sourceIdentifier": "security@android.com", "published": "2023-08-14T22:15:12.897", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:42:30.400", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In decideCancelProvisioningDialog of AdminIntegratedFlowPrepareActivity.java, there is a possible way to bypass factory reset protections due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*", + "matchCriteriaId": "F3B54CC6-C4CB-4BBD-AADC-BC7A80F4F621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/ManagedProvisioning/+/8277a2a946e617a7ea65056e4cedeb1fecf3a5f5", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://source.android.com/security/bulletin/2023-08-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21276.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21276.json index 6a2855faa91..cbfb04f5fb3 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21276.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21276.json @@ -2,23 +2,92 @@ "id": "CVE-2023-21276", "sourceIdentifier": "security@android.com", "published": "2023-08-14T22:15:12.967", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:42:15.763", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In writeToParcel of CursorWindow.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*", + "matchCriteriaId": "F3B54CC6-C4CB-4BBD-AADC-BC7A80F4F621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/1272eec833fb49c30a4d8bdc432765e7c4413b3f", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-08-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21277.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21277.json index c518f789324..29e7f4ec38d 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21277.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21277.json @@ -2,23 +2,92 @@ "id": "CVE-2023-21277", "sourceIdentifier": "security@android.com", "published": "2023-08-14T22:15:13.023", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:42:02.660", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In visitUris of RemoteViews.java, there is a possible way to reveal images across users due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*", + "matchCriteriaId": "F3B54CC6-C4CB-4BBD-AADC-BC7A80F4F621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/9b58aee2a4528c60b0aa2540bd0f48d2871d2dc7", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-08-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21278.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21278.json index e7dfc12b31c..466f8b619a6 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21278.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21278.json @@ -2,23 +2,92 @@ "id": "CVE-2023-21278", "sourceIdentifier": "security@android.com", "published": "2023-08-14T22:15:13.087", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:41:52.680", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In multiple locations, there is a possible way to obscure the microphone privacy indicator due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*", + "matchCriteriaId": "F3B54CC6-C4CB-4BBD-AADC-BC7A80F4F621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/49773f9d871dd8975128fccf71513928a5a97345", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-08-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21279.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21279.json index 230c1efedb4..2a9a95034d6 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21279.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21279.json @@ -2,23 +2,92 @@ "id": "CVE-2023-21279", "sourceIdentifier": "security@android.com", "published": "2023-08-14T22:15:13.150", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:41:38.990", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In visitUris of RemoteViews.java, there is a possible cross-user media read due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*", + "matchCriteriaId": "F3B54CC6-C4CB-4BBD-AADC-BC7A80F4F621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/155b14600fb13553a47b4e45fe0acd163da07453", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-08-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21280.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21280.json index 41eb2e62d9d..15fd4979def 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21280.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21280.json @@ -2,23 +2,92 @@ "id": "CVE-2023-21280", "sourceIdentifier": "security@android.com", "published": "2023-08-14T22:15:13.217", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:41:11.510", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In setMediaButtonBroadcastReceiver of MediaSessionRecord.java, there is a possible permanent DoS due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*", + "matchCriteriaId": "F3B54CC6-C4CB-4BBD-AADC-BC7A80F4F621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/06e772e05514af4aa427641784c5eec39a892ed3", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-08-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21281.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21281.json index 9297d3ac06d..21d4b2f5c6c 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21281.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21281.json @@ -2,23 +2,97 @@ "id": "CVE-2023-21281", "sourceIdentifier": "security@android.com", "published": "2023-08-14T22:15:13.283", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:40:53.097", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In multiple functions of KeyguardViewMediator.java, there is a possible failure to lock after screen timeout due to a logic error in the code. This could lead to local escalation of privilege across users with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*", + "matchCriteriaId": "F3B54CC6-C4CB-4BBD-AADC-BC7A80F4F621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/badb243574d7fca9aa89152d9d25eeb4f8615385", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-08-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21282.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21282.json index 03a9d85de97..8c862c9e754 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21282.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21282.json @@ -2,23 +2,97 @@ "id": "CVE-2023-21282", "sourceIdentifier": "security@android.com", "published": "2023-08-14T22:15:13.347", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:40:21.370", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In TRANSPOSER_SETTINGS of lpp_tran.h, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*", + "matchCriteriaId": "F3B54CC6-C4CB-4BBD-AADC-BC7A80F4F621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/external/aac/+/4242f97d149b0bf0cd96f00cd1e9d30d5922cd46", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-08-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21283.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21283.json index 35af9ccc135..e237ff223bc 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21283.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21283.json @@ -2,27 +2,104 @@ "id": "CVE-2023-21283", "sourceIdentifier": "security@android.com", "published": "2023-08-14T22:15:13.407", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:39:50.113", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In multiple functions of StatusHints.java, there is a possible way to reveal images across users due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*", + "matchCriteriaId": "F3B54CC6-C4CB-4BBD-AADC-BC7A80F4F621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/e17fd149c0a2bf6cce56ebfae3fa5364fead22cc", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/packages/services/Telecomm/+/9b41a963f352fdb3da1da8c633d45280badfcb24", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-08-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21284.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21284.json index d6158611369..402903f7992 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21284.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21284.json @@ -2,23 +2,97 @@ "id": "CVE-2023-21284", "sourceIdentifier": "security@android.com", "published": "2023-08-14T22:15:13.477", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:39:15.520", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In multiple functions of DevicePolicyManager.java, there is a possible way to prevent enabling the Find my Device feature due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*", + "matchCriteriaId": "F3B54CC6-C4CB-4BBD-AADC-BC7A80F4F621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/ed3f25b7222d4cff471f2b7d22d1150348146957", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-08-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21285.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21285.json index 6d6a362c2c4..ef9f3d47268 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21285.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21285.json @@ -2,23 +2,97 @@ "id": "CVE-2023-21285", "sourceIdentifier": "security@android.com", "published": "2023-08-14T22:15:13.537", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:34:52.097", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In setMetadata of MediaSessionRecord.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*", + "matchCriteriaId": "F3B54CC6-C4CB-4BBD-AADC-BC7A80F4F621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/0c3b7ec3377e7fb645ec366be3be96bb1a252ca1", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-08-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26961.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26961.json index 655b4c9df58..609a33cf124 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26961.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26961.json @@ -2,12 +2,12 @@ "id": "CVE-2023-26961", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-08T20:15:10.080", - "lastModified": "2023-08-14T14:19:59.293", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-21T17:15:46.583", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Alteryx Server 2022.1.1.42590 does not employ file type verification for uploaded files. This vulnerability allows attackers to upload arbitrary files by changing the extension of the uploaded file." + "value": "Alteryx Server 2022.1.1.42590 does not employ file type verification for uploaded files. This vulnerability allows attackers to upload arbitrary files (e.g., JavaScript content for stored XSS) via the type field in a JSON document within a PUT /gallery/api/media request." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28481.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28481.json index 3303c561a0e..bf0da394bcf 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28481.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28481.json @@ -2,19 +2,75 @@ "id": "CVE-2023-28481", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T19:15:10.413", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:18:27.813", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Tigergraph Enterprise 3.7.0. There is unsecured write access to SSH authorized keys file. Any code running as the tigergraph user is able to add their SSH public key into the authorised keys file. This allows an attacker to obtain password-less SSH key access by using their own SSH key." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tigergraph:tigergraph:3.7.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "BA582564-26E0-465D-A957-0EFD55AC3D03" + } + ] + } + ] + } + ], "references": [ { "url": "https://neo4j.com/security/cve-2023-28481/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28482.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28482.json index 0d928a8887f..d6a349146d0 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28482.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28482.json @@ -2,19 +2,75 @@ "id": "CVE-2023-28482", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T19:15:10.513", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:21:28.503", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Tigergraph Enterprise 3.7.0. A single TigerGraph instance can host multiple graphs that are accessed by multiple different users. The TigerGraph platform does not protect the confidentiality of any data uploaded to the remote server. In this scenario, any user that has permissions to upload data can browse data uploaded by any other user (irrespective of their permissions)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tigergraph:tigergraph:3.7.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "BA582564-26E0-465D-A957-0EFD55AC3D03" + } + ] + } + ] + } + ], "references": [ { "url": "https://neo4j.com/security/cve-2023-28482/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28483.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28483.json index 35c879ba106..9b9be55cfa8 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28483.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28483.json @@ -2,19 +2,75 @@ "id": "CVE-2023-28483", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T19:15:10.567", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:04:17.013", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Tigergraph Enterprise 3.7.0. The GSQL query language provides users with the ability to write data to files on a remote TigerGraph server. The locations that a query is allowed to write to are configurable via the GSQL.FileOutputPolicy configuration setting. GSQL queries that contain UDFs can bypass this configuration setting and, as a consequence, can write to any file location to which the administrative user has access." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tigergraph:tigergraph:3.7.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "BA582564-26E0-465D-A957-0EFD55AC3D03" + } + ] + } + ] + } + ], "references": [ { "url": "https://neo4j.com/security/cve-2023-28483/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28714.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28714.json index b3eb5fd80cc..207d93774e0 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28714.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28714.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28714", "sourceIdentifier": "secure@intel.com", "published": "2023-08-11T03:15:25.880", - "lastModified": "2023-08-11T03:44:51.127", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:57:50.237", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,56 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.220.0", + "matchCriteriaId": "F49E398F-DCA2-4584-BB56-3EF5A297ED8B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00872.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28736.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28736.json index 6dd2b09e762..3d4562c0615 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28736.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28736.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28736", "sourceIdentifier": "secure@intel.com", "published": "2023-08-11T03:15:25.950", - "lastModified": "2023-08-11T03:44:51.127", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:51:39.290", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,53 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mdadm_project:mdadm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.2", + "matchCriteriaId": "57006DDC-FD21-43BC-9DE8-6E03993FAB65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mdadm_project:mdadm:4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "83942058-12AC-41D8-9966-54FC9FABCE4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mdadm_project:mdadm:4.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "2D9C5AB9-778F-4A22-91E2-04A124833A49" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00690.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28768.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28768.json index a240bba98dd..9be3f6076e9 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28768.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28768.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28768", "sourceIdentifier": "security@zyxel.com.tw", "published": "2023-08-14T17:15:10.157", - "lastModified": "2023-08-14T17:27:48.160", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:07:05.947", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -35,6 +35,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + }, { "source": "security@zyxel.com.tw", "type": "Secondary", @@ -46,10 +56,313 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:xgs2220-30_firmware:4.80\\(abxn.1\\):*:*:*:*:*:*:*", + "matchCriteriaId": "A2EEDB89-057E-4FA4-99BF-4A85C63B05B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:xgs2220-30:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4F2BEA8-4817-4E14-B5B1-901671AD5E67" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:xgs2220-30f_firmware:4.80\\(abye.1\\):*:*:*:*:*:*:*", + "matchCriteriaId": "AEE3D04C-A256-43D8-B1CB-5D2F8308F48D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:xgs2220-30f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A53E4C3-77BD-4646-8B78-9E3A77585779" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:xgs2220-30hp_firmware:4.80\\(abxo.1\\):*:*:*:*:*:*:*", + "matchCriteriaId": "318E9F6B-2D24-4FAD-86D6-CEEF5B69A606" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:xgs2220-30hp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACCEDBD-3152-4549-9F80-C12715A51BE3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:xgs2220-54_firmware:4.80\\(abxp.1\\):*:*:*:*:*:*:*", + "matchCriteriaId": "827B19A6-3006-46EF-8A5A-C5800428A0A9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:xgs2220-54:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51B14340-165C-407D-B609-B17C44A90D4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:xgs2220-54fp_firmware:4.80\\(acce.1\\):*:*:*:*:*:*:*", + "matchCriteriaId": "145E79B5-559E-4701-8232-E37665646947" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:xgs2220-54fp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E578CCE-7347-4A9D-A8F2-ADEF6B37BDA2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:xgs2220-54hp_firmware:4.80\\(abxq.1\\):*:*:*:*:*:*:*", + "matchCriteriaId": "3F704060-74A6-4E63-B15F-D93D4B5ECC88" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:xgs2220-54hp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF030C04-7B74-4B23-8CE9-2D78403B188E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:xmg1930-30_firmware:4.80\\(acar.1\\):*:*:*:*:*:*:*", + "matchCriteriaId": "E53CFC62-7077-41D2-8749-CDCCE9E021D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:xmg1930-30:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58D71444-A727-4B2A-AB17-3BC790829072" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:xmg1930-30hp_firmware:4.80\\(acas.1\\):*:*:*:*:*:*:*", + "matchCriteriaId": "65963F09-74C2-4EA3-8DC8-D8C4EEC36538" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:xmg1930-30hp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42C2DF2C-0060-45A3-99A3-0B5A37CCC241" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:xs1930-10_firmware:4.80\\(abqe.1\\):*:*:*:*:*:*:*", + "matchCriteriaId": "D037CF12-2F62-46AE-AEC0-8BFD94FBEAD0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:xs1930-10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F675B520-4F05-41D6-ADDF-C26A9C427A55" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:xs1930-12f_firmware:4.80\\(abzv.1\\):*:*:*:*:*:*:*", + "matchCriteriaId": "AD3211B9-2B47-4328-AA29-E366A6D238DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:xs1930-12f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB74204B-D5FB-44C6-A59C-8133ECE9CD75" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:xs1930-12hp_firmware:4.80\\(abqf.1\\):*:*:*:*:*:*:*", + "matchCriteriaId": "E3E7BBA5-A534-45DE-A5C0-10EFEE929635" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:xs1930-12hp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E2171AB-AE63-45F6-9B22-2F93C105B18D" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-dos-vulnerability-of-xgs2220-xmg1930-and-xs1930-series-switches", - "source": "security@zyxel.com.tw" + "source": "security@zyxel.com.tw", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28773.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28773.json index 10aaeded48c..58f2525dc71 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28773.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28773.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28773", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-08T13:15:10.233", - "lastModified": "2023-08-08T13:57:34.073", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:57:03.890", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kolja-nolte:secondary_title:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.0.9.1", + "matchCriteriaId": "EC2369E5-3B0D-4C62-8642-0B0939389BC2" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/secondary-title/wordpress-secondary-title-plugin-2-0-9-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-289xx/CVE-2023-28938.json b/CVE-2023/CVE-2023-289xx/CVE-2023-28938.json index 68ff9499727..5d28e7eea94 100644 --- a/CVE-2023/CVE-2023-289xx/CVE-2023-28938.json +++ b/CVE-2023/CVE-2023-289xx/CVE-2023-28938.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28938", "sourceIdentifier": "secure@intel.com", "published": "2023-08-11T03:15:27.257", - "lastModified": "2023-08-11T03:44:51.127", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:55:01.507", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,53 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mdadm_project:mdadm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.2", + "matchCriteriaId": "57006DDC-FD21-43BC-9DE8-6E03993FAB65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mdadm_project:mdadm:4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "83942058-12AC-41D8-9966-54FC9FABCE4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mdadm_project:mdadm:4.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "2D9C5AB9-778F-4A22-91E2-04A124833A49" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00690.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2803.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2803.json index a54ee961014..97cb6b4611d 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2803.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2803.json @@ -2,15 +2,38 @@ "id": "CVE-2023-2803", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-14T20:15:11.547", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:10:22.023", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Ultimate Addons for Contact Form 7 WordPress plugin before 3.1.29 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themefic:ultimate_addons_for_contact_form_7:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.29", + "matchCriteriaId": "56F326EB-BF3E-4B11-9605-75D5B0403DCB" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/ec640d47-bb22-478d-9668-1dab72f12f8d", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2916.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2916.json index d83d8b7ccd4..6e3b19809c1 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2916.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2916.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2916", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-15T09:15:09.713", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:49:19.573", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-668" + } + ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,18 +76,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:revmakx:infinitewp_client:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "DA2C819A-AE97-4E6E-BD0B-A78EE7A01E26" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/iwp-client/tags/1.11.1/core.class.php#L365", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/2925897/iwp-client#file4", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aa157c80-447f-4406-9e49-9cc6208b7b19?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30186.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30186.json index 84918b181af..85accafd8c9 100644 --- a/CVE-2023/CVE-2023-301xx/CVE-2023-30186.json +++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30186.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30186", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T13:15:10.420", - "lastModified": "2023-08-18T03:21:09.943", + "lastModified": "2023-08-21T16:57:17.133", "vulnStatus": "Analyzed", "descriptions": [ { @@ -17,19 +17,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "attackVector": "LOCAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", + "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "baseScore": 9.8, + "baseSeverity": "CRITICAL" }, - "exploitabilityScore": 1.8, + "exploitabilityScore": 3.9, "impactScore": 5.9 } ] diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30187.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30187.json index db1dc37b81f..8af5fa75ba8 100644 --- a/CVE-2023/CVE-2023-301xx/CVE-2023-30187.json +++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30187.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30187", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T13:15:10.527", - "lastModified": "2023-08-18T03:20:19.403", + "lastModified": "2023-08-21T16:57:23.873", "vulnStatus": "Analyzed", "descriptions": [ { @@ -17,19 +17,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "attackVector": "LOCAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", + "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "baseScore": 9.8, + "baseSeverity": "CRITICAL" }, - "exploitabilityScore": 1.8, + "exploitabilityScore": 3.9, "impactScore": 5.9 } ] diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30188.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30188.json index b9b4314c220..b9b166bc711 100644 --- a/CVE-2023/CVE-2023-301xx/CVE-2023-30188.json +++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30188.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30188", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T13:15:10.720", - "lastModified": "2023-08-18T03:19:32.193", + "lastModified": "2023-08-21T16:57:38.130", "vulnStatus": "Analyzed", "descriptions": [ { @@ -17,19 +17,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", - "attackVector": "LOCAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", + "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "baseScore": 7.5, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 1.8, + "exploitabilityScore": 3.9, "impactScore": 3.6 } ] diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30754.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30754.json index 42aabe02c0d..84e3a3222fb 100644 --- a/CVE-2023/CVE-2023-307xx/CVE-2023-30754.json +++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30754.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30754", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-14T15:15:12.123", - "lastModified": "2023-08-14T15:58:29.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:31:57.847", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adfoxly:adfoxly:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.8.5", + "matchCriteriaId": "E5F28128-CA11-490D-A897-D1E6BDB5D1B8" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/adfoxly/wordpress-adfoxly-ad-manager-adsense-ads-ads-txt-plugin-1-8-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31246.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31246.json index 4838e89aaad..86c2b4e0d02 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31246.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31246.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31246", "sourceIdentifier": "secure@intel.com", "published": "2023-08-11T03:15:31.570", - "lastModified": "2023-08-11T03:44:51.127", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:51:07.383", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,59 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:server_debug_and_provisioning_tool:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4", + "matchCriteriaId": "8AC96E98-AC54-4317-B9C3-6281F7456613" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:server_debug_and_provisioning_tool:1.4:build_2:*:*:*:*:*:*", + "matchCriteriaId": "CCC8F48E-3F17-4CBF-B1E1-1469715196D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:server_debug_and_provisioning_tool:1.4:build_3:*:*:*:*:*:*", + "matchCriteriaId": "69412E99-BF49-4E16-92A0-431767D9513F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:server_debug_and_provisioning_tool:1.4:build_4:*:*:*:*:*:*", + "matchCriteriaId": "50421F17-BD45-43EE-8739-C6B731250630" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00905.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31447.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31447.json new file mode 100644 index 00000000000..17208c61b90 --- /dev/null +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31447.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-31447", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-21T17:15:46.847", + "lastModified": "2023-08-21T17:15:46.847", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "user_login.cgi on Draytek Vigor2620 devices before 3.9.8.4 (and on all versions of Vigor2925 devices) allows attackers to send a crafted payload to modify the content of the code segment, insert shellcode, and execute arbitrary code." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://draytek.com", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/rrrrrrri/013c9eef64b265af4163478bfcf29ff4", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3160.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3160.json index dff09230f1d..07367a4ada1 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3160.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3160.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3160", "sourceIdentifier": "security@eset.com", "published": "2023-08-14T10:15:09.503", - "lastModified": "2023-08-14T13:06:15.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:03:22.640", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security@eset.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + }, { "source": "security@eset.com", "type": "Secondary", @@ -46,10 +76,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eset:endpoint_antivirus:-:*:*:*:*:-:*:*", + "matchCriteriaId": "2B76C798-A8F7-4705-B85A-98CE4C44AC53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eset:endpoint_security:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81593DEE-54D7-49D5-9AE6-20B7E2B0AF8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eset:internet_security:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2CAD248-1F32-4459-A530-8706E334C67F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eset:mail_security:-:*:*:*:*:domino:*:*", + "matchCriteriaId": "5043B5B1-38B2-4621-B738-A79E5DF8D98E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eset:mail_security:-:*:*:*:*:exchange_server:*:*", + "matchCriteriaId": "DE40A56E-EBC0-43C8-85FB-868802B4817F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eset:nod32:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82540E3B-B426-424F-A6FD-C0AAB596389A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eset:security:-:*:*:*:*:sharepoint_server:*:*", + "matchCriteriaId": "D6CCDFB5-D27D-40F5-9BFC-274DA84783E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eset:server_security:-:*:*:*:*:windows_server:*:*", + "matchCriteriaId": "74BC745B-A4C5-4EAE-B985-78FDA3C40516" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eset:smart_security:-:*:*:*:premium:*:*:*", + "matchCriteriaId": "375F46B4-9FDF-48FB-935A-8BB6FEF5221A" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.eset.com/en/ca8466", - "source": "security@eset.com" + "source": "security@eset.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32002.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32002.json new file mode 100644 index 00000000000..3beed9aa1ec --- /dev/null +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32002.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-32002", + "sourceIdentifier": "support@hackerone.com", + "published": "2023-08-21T17:15:47.000", + "lastModified": "2023-08-21T17:15:47.000", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://hackerone.com/reports/1960870", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32663.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32663.json index 6cc75b9081e..809519b18ae 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32663.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32663.json @@ -2,12 +2,12 @@ "id": "CVE-2023-32663", "sourceIdentifier": "secure@intel.com", "published": "2023-08-11T03:15:32.987", - "lastModified": "2023-08-17T16:45:58.003", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-21T17:15:47.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Incorrect default permissions in some Intel(R) RealSense(TM) SDKs in version 0.25.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + "value": "Incorrect default permissions in some Intel(R) RealSense(TM) SDKs in version 2.53.1 may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n" } ], "metrics": { diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3328.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3328.json index 60cb70b4f25..23e1366e184 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3328.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3328.json @@ -2,15 +2,38 @@ "id": "CVE-2023-3328", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-14T20:15:11.663", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:14:56.370", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Custom Field For WP Job Manager WordPress plugin before 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:custom_field_for_wp_job_manager_project:custom_field_for_wp_job_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2", + "matchCriteriaId": "48A981FF-3252-4ACA-94FE-2543605E74A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/d8b76875-cf7f-43a9-b88b-d8aefefab131", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3366.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3366.json new file mode 100644 index 00000000000..b303b8325a0 --- /dev/null +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3366.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-3366", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-08-21T17:15:48.927", + "lastModified": "2023-08-21T17:15:48.927", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The MultiParcels Shipping For WooCommerce WordPress plugin before 1.15.2 does not have CRSF check when deleting a shipment, allowing attackers to make any logged in user, delete arbitrary shipment via a CSRF attack" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/b2f06223-9352-4227-ae94-32061e2c5611", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3435.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3435.json index 40ca34196e4..81a6b182b35 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3435.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3435.json @@ -2,15 +2,38 @@ "id": "CVE-2023-3435", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-14T20:15:11.747", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:04:43.700", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The User Activity Log WordPress plugin before 1.6.5 does not correctly sanitise and escape several parameters before using it in a SQL statement as part of its exportation feature, allowing unauthenticated attackers to conduct SQL injection attacks." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:solwininfotech:user_activity_log:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.6.5", + "matchCriteriaId": "2ACDD8B1-FE7A-48A1-BD34-E650D32AF2C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/30a37a61-0d16-46f7-b9d8-721d983afc6b", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3601.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3601.json index 6e7e6bf499b..1cc80150e1c 100644 --- a/CVE-2023/CVE-2023-36xx/CVE-2023-3601.json +++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3601.json @@ -2,15 +2,38 @@ "id": "CVE-2023-3601", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-14T20:15:11.827", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:05:15.807", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Simple Author Box WordPress plugin before 2.52 does not verify a user ID before outputting information about that user, leading to arbitrary user information disclosure to users with a role as low as Contributor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webfactoryltd:simple_author_box:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.52", + "matchCriteriaId": "8F9A6FF8-DA9E-46C0-92E6-FB95E4EF24F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/c0cc513e-c306-4920-9afb-e33d95a7292f", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3604.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3604.json new file mode 100644 index 00000000000..21f6823b91b --- /dev/null +++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3604.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-3604", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-08-21T17:15:49.260", + "lastModified": "2023-08-21T17:15:49.260", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Change WP Admin Login WordPress plugin before 1.1.4 discloses the URL of the hidden login page when accessing a crafted URL, bypassing the protection offered." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/8f6615e8-f607-4ce4-a0e0-d5fc841ead16", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3645.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3645.json index 3b2c80bd467..380b5346f1b 100644 --- a/CVE-2023/CVE-2023-36xx/CVE-2023-3645.json +++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3645.json @@ -2,15 +2,38 @@ "id": "CVE-2023-3645", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-14T20:15:12.103", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:06:14.470", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Contact Form Builder by Bit Form WordPress plugin before 2.2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bitapps:contact_form_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "A7ED2BAF-CAA9-46AB-A5E2-19BC3FDBB4A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/58c11f1e-6ea0-468c-b974-4aea9eb94b82", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3667.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3667.json new file mode 100644 index 00000000000..6f4bf47b8eb --- /dev/null +++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3667.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-3667", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-08-21T17:15:49.617", + "lastModified": "2023-08-21T17:15:49.617", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Bit Assist WordPress plugin before 1.1.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/9f2f3f85-6812-46b5-9175-c56f6852afd7", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3721.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3721.json index d0e84929d58..57f9a1d9edd 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3721.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3721.json @@ -2,18 +2,41 @@ "id": "CVE-2023-3721", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-14T20:15:12.413", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:53:45.117", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The WP-EMail WordPress plugin before 2.69.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { - "source": "contact@wpscan.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -21,12 +44,44 @@ "value": "CWE-79" } ] + }, + { + "source": "contact@wpscan.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lesterchan:wp-email:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.69.1", + "matchCriteriaId": "3F45FEDE-6C11-4D4A-B0BD-305C51FFF803" + } + ] + } + ] } ], "references": [ { "url": "https://wpscan.com/vulnerability/3f90347a-6586-4648-9f2c-d4f321bf801a", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38035.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38035.json new file mode 100644 index 00000000000..8b008c3ee87 --- /dev/null +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38035.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-38035", + "sourceIdentifier": "support@hackerone.com", + "published": "2023-08-21T17:15:47.457", + "lastModified": "2023-08-21T17:15:47.457", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration. " + } + ], + "metrics": {}, + "references": [ + { + "url": "https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38836.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38836.json new file mode 100644 index 00000000000..b6ed2fb37f2 --- /dev/null +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38836.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-38836", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-21T17:15:47.633", + "lastModified": "2023-08-21T17:15:47.633", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "File Upload vulnerability in BoidCMS v.2.0.0 allows a remote attacker to execute arbitrary code via the GIF header component." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://boidcms.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/BoidCMS/BoidCMS/issues/27", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38840.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38840.json index aa10e4befe1..ae302a96851 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38840.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38840.json @@ -2,16 +2,20 @@ "id": "CVE-2023-38840", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-15T17:15:10.320", - "lastModified": "2023-08-17T16:15:09.893", + "lastModified": "2023-08-21T17:15:47.793", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Bitwarden Windows Desktop v2023.5.1 and below allows an attacker with local access to obtain sensitive information via the Bitwarden.exe process." + "value": "Bitwarden Desktop 2023.7.0 and below allows an attacker with local access to obtain sensitive information via the Bitwarden.exe process." } ], "metrics": {}, "references": [ + { + "url": "https://github.com/bitwarden/clients/pull/5813", + "source": "cve@mitre.org" + }, { "url": "https://github.com/bitwarden/desktop/issues/476", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38961.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38961.json new file mode 100644 index 00000000000..87854df5977 --- /dev/null +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38961.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-38961", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-21T17:15:47.973", + "lastModified": "2023-08-21T17:15:47.973", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflwo vulnerability in JerryScript Project jerryscript v.3.0.0 allows a remote attacker to execute arbitrary code via the scanner_is_context_needed component in js-scanner-until.c." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jerryscript-project/jerryscript/issues/5092", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38976.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38976.json new file mode 100644 index 00000000000..d5a18231309 --- /dev/null +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38976.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-38976", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-21T17:15:48.127", + "lastModified": "2023-08-21T17:15:48.127", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in weaviate v.1.20.0 allows a remote attacker to cause a denial of service via the handleUnbatchedGraphQLRequest function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/weaviate/weaviate/issues/3258", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3824.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3824.json index 150b7f7bc22..6642488a110 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3824.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3824.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3824", "sourceIdentifier": "security@php.net", "published": "2023-08-11T06:15:10.560", - "lastModified": "2023-08-12T06:19:10.403", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:31:40.680", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security@php.net", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + }, { "source": "security@php.net", "type": "Secondary", @@ -46,14 +76,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.0.30", + "matchCriteriaId": "C516377E-EAA8-4534-B0B8-4BF7A664DDFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.1.0", + "versionEndExcluding": "8.1.22", + "matchCriteriaId": "3DA6AD3E-CB35-4AF2-86E9-3BC831728058" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.2.0", + "versionEndExcluding": "8.2.8", + "matchCriteriaId": "32E9658B-C729-4A49-98BE-CD0F8E782667" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv", - "source": "security@php.net" + "source": "security@php.net", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/", - "source": "security@php.net" + "source": "security@php.net", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39061.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39061.json new file mode 100644 index 00000000000..8a6c2bc93d6 --- /dev/null +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39061.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-39061", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-21T17:15:48.277", + "lastModified": "2023-08-21T17:15:48.277", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Request Forgery (CSRF) vulnerability in Chamilo v.1.11 thru v.1.11.20 allows a remote authenticated privileged attacker to execute arbitrary code." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://chamilo.com", + "source": "cve@mitre.org" + }, + { + "url": "https://support.chamilo.org/projects/chamilo-18/wiki/Security_issues#Issue-123-2023-07-08-Moderate-impact-Moderate-risk-CSRF-through-admin-account-forum-posts", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39094.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39094.json new file mode 100644 index 00000000000..b1e1548ad16 --- /dev/null +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39094.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-39094", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-21T17:15:48.437", + "lastModified": "2023-08-21T17:15:48.437", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in ZeroWdd studentmanager v.1.0 allows a remote attacker to execute arbitrary code via the username parameter in the student list function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ZeroWdd/studentmanager/issues/12", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39106.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39106.json new file mode 100644 index 00000000000..6e81fc87446 --- /dev/null +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39106.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-39106", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-21T17:15:48.587", + "lastModified": "2023-08-21T17:15:48.587", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in Nacos Group Nacos Spring Project v.1.1.1 and before allows a remote attacker to execute arbitrary code via the SnakeYamls Constructor() component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/nacos-group/nacos-spring-project/issues/314", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39292.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39292.json index 4e78372ca51..a2e10c731d4 100644 --- a/CVE-2023/CVE-2023-392xx/CVE-2023-39292.json +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39292.json @@ -2,19 +2,93 @@ "id": "CVE-2023-39292", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T19:15:12.897", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:24:42.877", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability has been identified in the MiVoice Office 400 SMB Controller through 1.2.5.23 which could allow a malicious actor to access sensitive information and execute arbitrary database and management operations." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mitel:mivoice_office_400:*:*:*:*:*:*:*:*", + "versionEndIncluding": "7.0.9281", + "matchCriteriaId": "B6BA3954-75F0-4CE5-A76C-5BF0E467F2A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:mivoice_office_400_smb_controller_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.2.5.23", + "matchCriteriaId": "84538675-E950-4902-BE84-D51FFCB4DC5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:mivoice_office_400_smb_controller:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC91A7AC-4869-49D7-AB93-5B521A470AC8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0008", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39293.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39293.json index fd53ed3e59e..74bf15911d2 100644 --- a/CVE-2023/CVE-2023-392xx/CVE-2023-39293.json +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39293.json @@ -2,19 +2,93 @@ "id": "CVE-2023-39293", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T19:15:13.017", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:58:05.637", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A Command Injection vulnerability has been identified in the MiVoice Office 400 SMB Controller through 1.2.5.23 which could allow a malicious actor to execute arbitrary commands within the context of the system." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mitel:mivoice_office_400:*:*:*:*:*:*:*:*", + "versionEndIncluding": "7.0.9281", + "matchCriteriaId": "B6BA3954-75F0-4CE5-A76C-5BF0E467F2A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:mivoice_office_400_smb_controller_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.2.5.23", + "matchCriteriaId": "84538675-E950-4902-BE84-D51FFCB4DC5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:mivoice_office_400_smb_controller:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC91A7AC-4869-49D7-AB93-5B521A470AC8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0009", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-396xx/CVE-2023-39660.json b/CVE-2023/CVE-2023-396xx/CVE-2023-39660.json new file mode 100644 index 00000000000..2f7678f6a79 --- /dev/null +++ b/CVE-2023/CVE-2023-396xx/CVE-2023-39660.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-39660", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-21T17:15:48.797", + "lastModified": "2023-08-21T17:15:48.797", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in Gaberiele Venturi pandasai v.0.8.0 and before allows a remote attacker to execute arbitrary code via a crafted request to the prompt function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/gventuri/pandas-ai/issues/399", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/gventuri/pandas-ai/pull/409", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-398xx/CVE-2023-39852.json b/CVE-2023/CVE-2023-398xx/CVE-2023-39852.json index df2e2ab4a3a..5ee88301dd8 100644 --- a/CVE-2023/CVE-2023-398xx/CVE-2023-39852.json +++ b/CVE-2023/CVE-2023-398xx/CVE-2023-39852.json @@ -2,23 +2,82 @@ "id": "CVE-2023-39852", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-15T21:15:09.907", - "lastModified": "2023-08-21T07:15:34.127", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-08-21T17:51:08.113", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "** DISPUTED ** Doctormms v1.0 was discovered to contain a SQL injection vulnerability via the $userid parameter at myAppoinment.php. NOTE: this is disputed by a third party who indicates that the userid is a session variable controlled by the server, and thus cannot be used for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "68074324-B3A0-4D9A-B66B-CB3E1DDE661F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/KLSEHB/vulnerability-report/blob/main/Doctormms_CVE-2023-39852", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14182/doctor-appointment-system.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3936.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3936.json new file mode 100644 index 00000000000..29d77521d8c --- /dev/null +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3936.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-3936", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-08-21T17:15:49.967", + "lastModified": "2023-08-21T17:15:49.967", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Blog2Social WordPress plugin before 7.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/6d09a5d3-046d-47ef-86b4-c024ea09dc0f", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3954.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3954.json new file mode 100644 index 00000000000..d8ec87393c0 --- /dev/null +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3954.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-3954", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-08-21T17:15:50.047", + "lastModified": "2023-08-21T17:15:50.047", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The MultiParcels Shipping For WooCommerce WordPress plugin before 1.15.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/b463ccbb-2dc1-479f-bc88-becd204b2dc0", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40294.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40294.json index 0183c29bc73..8dab6355000 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40294.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40294.json @@ -2,19 +2,75 @@ "id": "CVE-2023-40294", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T04:15:11.337", - "lastModified": "2023-08-14T13:06:15.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:25:38.010", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "libboron in Boron 2.0.8 has a heap-based buffer overflow in ur_parseBlockI at i_parse_blk.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:0branch:boron:2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "82303CD4-FB83-4A0E-8F7E-0FEB740E4C03" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/0branch/boron/issues/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40295.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40295.json index 011622afd13..d7e3d4eabbb 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40295.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40295.json @@ -2,19 +2,75 @@ "id": "CVE-2023-40295", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T04:15:11.403", - "lastModified": "2023-08-14T13:06:15.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:35:53.970", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "libboron in Boron 2.0.8 has a heap-based buffer overflow in ur_strInitUtf8 at string.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:0branch:boron:2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "82303CD4-FB83-4A0E-8F7E-0FEB740E4C03" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/0branch/boron/issues/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40305.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40305.json index 91f5d522684..9044f529d2e 100644 --- a/CVE-2023/CVE-2023-403xx/CVE-2023-40305.json +++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40305.json @@ -2,23 +2,83 @@ "id": "CVE-2023-40305", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-14T06:15:09.683", - "lastModified": "2023-08-14T13:06:15.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T16:00:37.383", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "GNU indent 2.2.13 has a heap-based buffer overflow in search_brace in indent.c via a crafted file." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnu:indent:2.2.13:*:*:*:*:*:*:*", + "matchCriteriaId": "0840F9FF-EA53-47DD-813A-889E6EAA76A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://ftp.gnu.org/gnu/indent/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://savannah.gnu.org/bugs/index.php?64503", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4308.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4308.json index 37513dbd531..8b6ec29a1cf 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4308.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4308.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4308", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-15T08:15:09.717", - "lastModified": "2023-08-15T12:29:16.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-21T17:54:39.980", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", @@ -46,14 +66,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:plugin-planet:user_submitted_posts:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "20230811", + "matchCriteriaId": "387AEB00-B4FE-4E03-B30F-9AB7E176F5C8" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/2952471/user-submitted-posts", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3bb4d37c-c4c2-4523-9b4e-73ffb7be81ea?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4350.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4350.json index b2cecf3ba56..c91d64460fd 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4350.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4350.json @@ -2,31 +2,135 @@ "id": "CVE-2023-4350", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-08-15T18:15:11.103", - "lastModified": "2023-08-20T03:15:15.703", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-08-21T17:27:02.017", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "116.0.5845.96", + "matchCriteriaId": "40820217-BB18-474A-8520-109C1635D656" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Third Party Advisory" + ] }, { "url": "https://crbug.com/1454817", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5479", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4351.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4351.json index 81dcbbbb3dd..f2421d7fd55 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4351.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4351.json @@ -2,31 +2,123 @@ "id": "CVE-2023-4351", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-08-15T18:15:11.260", - "lastModified": "2023-08-20T03:15:15.870", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-08-21T17:29:16.257", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "116.0.5845.96", + "matchCriteriaId": "40820217-BB18-474A-8520-109C1635D656" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://crbug.com/1465833", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5479", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4352.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4352.json index 739220a1847..a6dd7f3481f 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4352.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4352.json @@ -2,31 +2,123 @@ "id": "CVE-2023-4352", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-08-15T18:15:11.463", - "lastModified": "2023-08-20T03:15:16.283", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-08-21T17:35:28.180", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "116.0.5845.96", + "matchCriteriaId": "40820217-BB18-474A-8520-109C1635D656" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://crbug.com/1452076", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5479", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4353.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4353.json index ec7fa97c733..0e5234d0b26 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4353.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4353.json @@ -2,31 +2,123 @@ "id": "CVE-2023-4353", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-08-15T18:15:11.613", - "lastModified": "2023-08-20T03:15:16.470", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-08-21T17:36:21.240", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "116.0.5845.96", + "matchCriteriaId": "40820217-BB18-474A-8520-109C1635D656" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://crbug.com/1458046", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5479", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4354.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4354.json index c384b006e26..6991d24742c 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4354.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4354.json @@ -2,31 +2,123 @@ "id": "CVE-2023-4354", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-08-15T18:15:11.763", - "lastModified": "2023-08-20T03:15:16.833", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-08-21T17:37:13.257", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "116.0.5845.96", + "matchCriteriaId": "40820217-BB18-474A-8520-109C1635D656" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://crbug.com/1464215", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5479", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4355.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4355.json index 75379da7660..2fcdce1f846 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4355.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4355.json @@ -2,31 +2,123 @@ "id": "CVE-2023-4355", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-08-15T18:15:11.923", - "lastModified": "2023-08-20T03:15:17.210", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-08-21T17:39:24.197", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "116.0.5845.96", + "matchCriteriaId": "40820217-BB18-474A-8520-109C1635D656" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://crbug.com/1468943", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5479", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4356.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4356.json index c4fce9c10fa..60f23c4468b 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4356.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4356.json @@ -2,31 +2,123 @@ "id": "CVE-2023-4356", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-08-15T18:15:12.090", - "lastModified": "2023-08-20T03:15:17.737", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-08-21T17:40:42.347", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Use after free in Audio in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "116.0.5845.96", + "matchCriteriaId": "40820217-BB18-474A-8520-109C1635D656" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://crbug.com/1449929", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5479", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4361.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4361.json index c71d7378680..808fb9662bf 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4361.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4361.json @@ -2,31 +2,135 @@ "id": "CVE-2023-4361", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-08-15T18:15:12.960", - "lastModified": "2023-08-20T03:15:19.067", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-08-21T17:54:24.567", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "116.0.5845.96", + "matchCriteriaId": "40820217-BB18-474A-8520-109C1635D656" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Third Party Advisory" + ] }, { "url": "https://crbug.com/1465230", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5479", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4456.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4456.json new file mode 100644 index 00000000000..4ec20a80f73 --- /dev/null +++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4456.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2023-4456", + "sourceIdentifier": "secalert@redhat.com", + "published": "2023-08-21T17:15:50.283", + "lastModified": "2023-08-21T17:15:50.283", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in openshift-logging LokiStack. The key used for caching is just the token, which is too broad. This issue allows a user with a token valid for one action to execute other actions as long as the authorization allowing the original action is still cached." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2023-4456", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233087", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 1bed6cc35ba..70566550685 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-08-21T16:00:31.634679+00:00 +2023-08-21T18:00:38.765995+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-08-21T15:55:47.347000+00:00 +2023-08-21T17:58:05.637000+00:00 ``` ### Last Data Feed Release @@ -29,31 +29,61 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -223057 +223074 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `17` +* [CVE-2022-4367](CVE-2022/CVE-2022-43xx/CVE-2022-4367.json) (`2023-08-21T17:15:46.307`) +* [CVE-2023-31447](CVE-2023/CVE-2023-314xx/CVE-2023-31447.json) (`2023-08-21T17:15:46.847`) +* [CVE-2023-32002](CVE-2023/CVE-2023-320xx/CVE-2023-32002.json) (`2023-08-21T17:15:47.000`) +* [CVE-2023-38035](CVE-2023/CVE-2023-380xx/CVE-2023-38035.json) (`2023-08-21T17:15:47.457`) +* [CVE-2023-38836](CVE-2023/CVE-2023-388xx/CVE-2023-38836.json) (`2023-08-21T17:15:47.633`) +* [CVE-2023-38961](CVE-2023/CVE-2023-389xx/CVE-2023-38961.json) (`2023-08-21T17:15:47.973`) +* [CVE-2023-38976](CVE-2023/CVE-2023-389xx/CVE-2023-38976.json) (`2023-08-21T17:15:48.127`) +* [CVE-2023-39061](CVE-2023/CVE-2023-390xx/CVE-2023-39061.json) (`2023-08-21T17:15:48.277`) +* [CVE-2023-39094](CVE-2023/CVE-2023-390xx/CVE-2023-39094.json) (`2023-08-21T17:15:48.437`) +* [CVE-2023-39106](CVE-2023/CVE-2023-391xx/CVE-2023-39106.json) (`2023-08-21T17:15:48.587`) +* [CVE-2023-39660](CVE-2023/CVE-2023-396xx/CVE-2023-39660.json) (`2023-08-21T17:15:48.797`) +* [CVE-2023-3366](CVE-2023/CVE-2023-33xx/CVE-2023-3366.json) (`2023-08-21T17:15:48.927`) +* [CVE-2023-3604](CVE-2023/CVE-2023-36xx/CVE-2023-3604.json) (`2023-08-21T17:15:49.260`) +* [CVE-2023-3667](CVE-2023/CVE-2023-36xx/CVE-2023-3667.json) (`2023-08-21T17:15:49.617`) +* [CVE-2023-3936](CVE-2023/CVE-2023-39xx/CVE-2023-3936.json) (`2023-08-21T17:15:49.967`) +* [CVE-2023-3954](CVE-2023/CVE-2023-39xx/CVE-2023-3954.json) (`2023-08-21T17:15:50.047`) +* [CVE-2023-4456](CVE-2023/CVE-2023-44xx/CVE-2023-4456.json) (`2023-08-21T17:15:50.283`) ### CVEs modified in the last Commit -Recently modified CVEs: `12` +Recently modified CVEs: `60` -* [CVE-2021-28025](CVE-2021/CVE-2021-280xx/CVE-2021-28025.json) (`2023-08-21T15:41:19.287`) -* [CVE-2022-41984](CVE-2022/CVE-2022-419xx/CVE-2022-41984.json) (`2023-08-21T14:33:50.620`) -* [CVE-2022-36392](CVE-2022/CVE-2022-363xx/CVE-2022-36392.json) (`2023-08-21T14:34:05.403`) -* [CVE-2022-45112](CVE-2022/CVE-2022-451xx/CVE-2022-45112.json) (`2023-08-21T14:34:23.620`) -* [CVE-2022-38973](CVE-2022/CVE-2022-389xx/CVE-2022-38973.json) (`2023-08-21T14:34:40.520`) -* [CVE-2023-2606](CVE-2023/CVE-2023-26xx/CVE-2023-2606.json) (`2023-08-21T14:05:18.320`) -* [CVE-2023-40303](CVE-2023/CVE-2023-403xx/CVE-2023-40303.json) (`2023-08-21T14:24:42.610`) -* [CVE-2023-2802](CVE-2023/CVE-2023-28xx/CVE-2023-2802.json) (`2023-08-21T14:27:16.020`) -* [CVE-2023-22276](CVE-2023/CVE-2023-222xx/CVE-2023-22276.json) (`2023-08-21T14:31:52.990`) -* [CVE-2023-40235](CVE-2023/CVE-2023-402xx/CVE-2023-40235.json) (`2023-08-21T14:38:48.630`) -* [CVE-2023-32267](CVE-2023/CVE-2023-322xx/CVE-2023-32267.json) (`2023-08-21T15:48:26.110`) -* [CVE-2023-39553](CVE-2023/CVE-2023-395xx/CVE-2023-39553.json) (`2023-08-21T15:55:47.347`) +* [CVE-2023-0872](CVE-2023/CVE-2023-08xx/CVE-2023-0872.json) (`2023-08-21T17:12:20.407`) +* [CVE-2023-26961](CVE-2023/CVE-2023-269xx/CVE-2023-26961.json) (`2023-08-21T17:15:46.583`) +* [CVE-2023-32663](CVE-2023/CVE-2023-326xx/CVE-2023-32663.json) (`2023-08-21T17:15:47.183`) +* [CVE-2023-38840](CVE-2023/CVE-2023-388xx/CVE-2023-38840.json) (`2023-08-21T17:15:47.793`) +* [CVE-2023-28481](CVE-2023/CVE-2023-284xx/CVE-2023-28481.json) (`2023-08-21T17:18:27.813`) +* [CVE-2023-28482](CVE-2023/CVE-2023-284xx/CVE-2023-28482.json) (`2023-08-21T17:21:28.503`) +* [CVE-2023-20588](CVE-2023/CVE-2023-205xx/CVE-2023-20588.json) (`2023-08-21T17:24:22.070`) +* [CVE-2023-39292](CVE-2023/CVE-2023-392xx/CVE-2023-39292.json) (`2023-08-21T17:24:42.877`) +* [CVE-2023-40294](CVE-2023/CVE-2023-402xx/CVE-2023-40294.json) (`2023-08-21T17:25:38.010`) +* [CVE-2023-20586](CVE-2023/CVE-2023-205xx/CVE-2023-20586.json) (`2023-08-21T17:25:49.017`) +* [CVE-2023-20569](CVE-2023/CVE-2023-205xx/CVE-2023-20569.json) (`2023-08-21T17:26:07.933`) +* [CVE-2023-4350](CVE-2023/CVE-2023-43xx/CVE-2023-4350.json) (`2023-08-21T17:27:02.017`) +* [CVE-2023-4351](CVE-2023/CVE-2023-43xx/CVE-2023-4351.json) (`2023-08-21T17:29:16.257`) +* [CVE-2023-4352](CVE-2023/CVE-2023-43xx/CVE-2023-4352.json) (`2023-08-21T17:35:28.180`) +* [CVE-2023-40295](CVE-2023/CVE-2023-402xx/CVE-2023-40295.json) (`2023-08-21T17:35:53.970`) +* [CVE-2023-4353](CVE-2023/CVE-2023-43xx/CVE-2023-4353.json) (`2023-08-21T17:36:21.240`) +* [CVE-2023-4354](CVE-2023/CVE-2023-43xx/CVE-2023-4354.json) (`2023-08-21T17:37:13.257`) +* [CVE-2023-4355](CVE-2023/CVE-2023-43xx/CVE-2023-4355.json) (`2023-08-21T17:39:24.197`) +* [CVE-2023-4356](CVE-2023/CVE-2023-43xx/CVE-2023-4356.json) (`2023-08-21T17:40:42.347`) +* [CVE-2023-2916](CVE-2023/CVE-2023-29xx/CVE-2023-2916.json) (`2023-08-21T17:49:19.573`) +* [CVE-2023-39852](CVE-2023/CVE-2023-398xx/CVE-2023-39852.json) (`2023-08-21T17:51:08.113`) +* [CVE-2023-3721](CVE-2023/CVE-2023-37xx/CVE-2023-3721.json) (`2023-08-21T17:53:45.117`) +* [CVE-2023-4361](CVE-2023/CVE-2023-43xx/CVE-2023-4361.json) (`2023-08-21T17:54:24.567`) +* [CVE-2023-4308](CVE-2023/CVE-2023-43xx/CVE-2023-4308.json) (`2023-08-21T17:54:39.980`) +* [CVE-2023-39293](CVE-2023/CVE-2023-392xx/CVE-2023-39293.json) (`2023-08-21T17:58:05.637`) ## Download and Usage