From b9fa5a754add8603a680b541df7df41464324c34 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 22 May 2023 14:00:32 +0000 Subject: [PATCH] Auto-Update: 2023-05-22 14:00:29.257326+00:00 --- CVE-2016/CVE-2016-61xx/CVE-2016-6153.json | 6 +- CVE-2018/CVE-2018-87xx/CVE-2018-8740.json | 6 +- CVE-2021/CVE-2021-01xx/CVE-2021-0187.json | 1474 +++++- CVE-2021/CVE-2021-467xx/CVE-2021-46794.json | 4584 ++++++++++++++++++- CVE-2022/CVE-2022-363xx/CVE-2022-36330.json | 153 +- CVE-2023/CVE-2023-237xx/CVE-2023-23797.json | 4 +- CVE-2023/CVE-2023-255xx/CVE-2023-25537.json | 4 +- CVE-2023/CVE-2023-25xx/CVE-2023-2597.json | 55 + CVE-2023/CVE-2023-261xx/CVE-2023-26116.json | 18 +- CVE-2023/CVE-2023-261xx/CVE-2023-26117.json | 18 +- CVE-2023/CVE-2023-261xx/CVE-2023-26118.json | 18 +- CVE-2023/CVE-2023-287xx/CVE-2023-28709.json | 4 +- CVE-2023/CVE-2023-28xx/CVE-2023-2832.json | 4 +- CVE-2023/CVE-2023-310xx/CVE-2023-31058.json | 32 + CVE-2023/CVE-2023-316xx/CVE-2023-31612.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31613.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31614.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31615.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31616.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31617.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31618.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31619.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31620.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31621.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31622.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31623.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31624.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31625.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31626.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31627.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31628.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31629.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31630.json | 65 +- CVE-2023/CVE-2023-316xx/CVE-2023-31631.json | 65 +- CVE-2023/CVE-2023-317xx/CVE-2023-31779.json | 24 + README.md | 75 +- 36 files changed, 7628 insertions(+), 151 deletions(-) create mode 100644 CVE-2023/CVE-2023-25xx/CVE-2023-2597.json create mode 100644 CVE-2023/CVE-2023-310xx/CVE-2023-31058.json create mode 100644 CVE-2023/CVE-2023-317xx/CVE-2023-31779.json diff --git a/CVE-2016/CVE-2016-61xx/CVE-2016-6153.json b/CVE-2016/CVE-2016-61xx/CVE-2016-6153.json index be7ac378e0a..bb79c087d87 100644 --- a/CVE-2016/CVE-2016-61xx/CVE-2016-6153.json +++ b/CVE-2016/CVE-2016-61xx/CVE-2016-6153.json @@ -2,7 +2,7 @@ "id": "CVE-2016-6153", "sourceIdentifier": "cve@mitre.org", "published": "2016-09-26T16:59:03.523", - "lastModified": "2018-10-30T16:27:32.030", + "lastModified": "2023-05-22T13:15:09.220", "vulnStatus": "Modified", "descriptions": [ { @@ -160,6 +160,10 @@ "Vendor Advisory" ] }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00022.html", + "source": "cve@mitre.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IGQTH7V45QVHFDXJAEECHEO3HHD644WZ/", "source": "cve@mitre.org", diff --git a/CVE-2018/CVE-2018-87xx/CVE-2018-8740.json b/CVE-2018/CVE-2018-87xx/CVE-2018-8740.json index 44a7736e43a..d3c1049c05f 100644 --- a/CVE-2018/CVE-2018-87xx/CVE-2018-8740.json +++ b/CVE-2018/CVE-2018-87xx/CVE-2018-8740.json @@ -2,7 +2,7 @@ "id": "CVE-2018-8740", "sourceIdentifier": "cve@mitre.org", "published": "2018-03-17T00:29:00.247", - "lastModified": "2021-06-29T15:15:14.467", + "lastModified": "2023-05-22T13:15:09.370", "vulnStatus": "Modified", "descriptions": [ { @@ -156,6 +156,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html", "source": "cve@mitre.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00022.html", + "source": "cve@mitre.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/", "source": "cve@mitre.org" diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0187.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0187.json index 91aa23b48b6..27c2e41f162 100644 --- a/CVE-2021/CVE-2021-01xx/CVE-2021-0187.json +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0187.json @@ -2,8 +2,8 @@ "id": "CVE-2021-0187", "sourceIdentifier": "secure@intel.com", "published": "2023-02-16T20:15:12.210", - "lastModified": "2023-05-18T06:15:09.383", - "vulnStatus": "Modified", + "lastModified": "2023-05-22T13:59:17.053", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,1458 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6342_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03D1BED9-6173-4AC4-9453-9781EEC83E84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A4A44F2-68BF-4709-946B-C976DA3A9C7E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6346_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6159A5FD-F734-4557-BA2A-214B2570C58E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*", + "matchCriteriaId": "038AC553-5523-4687-843D-6FEA7264EDEA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6330_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ABB6218-E238-41F2-B349-8AF4B8DE6898" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8360y_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACE0C287-92FB-4BF2-B30D-0525C4266536" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E41414A-6B0B-4511-A9A1-7FF99DD25DB6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6354_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F273BA3-F5B3-4970-8759-C5069845EAD5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F14C3438-B876-45B9-85F5-61354207AF8A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6314u_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBA147EA-C92A-4255-948E-070616C09BC2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE3CA224-B5DE-4451-9CF9-929ABEA242EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6338n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C3E8BF2-E5D5-490B-B3CE-EF47DD5E259A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A57D44C0-AA8D-46B0-8923-ADB312E3937F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_silver_4314_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A58CEC44-41C3-44FA-A512-CE0B59F4B294" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1298CF87-124D-450B-928D-F39CCA2BAF42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_silver_4316_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "446A632A-3B5E-490B-BF69-91190885380F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF12820F-A2BE-44BF-A85D-7F4623898DAB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_5318y_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8936DD6D-8039-4C46-BBC5-DD6A9F73A22E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06F1CFD2-8F32-4CE8-9D9B-C65B332775B8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_5317_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "108518D9-D227-4F36-AE60-A56355D09622" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E0E7358-1EC1-43DA-99B3-A2D6D57E0121" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6334_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AEE9B3EC-2D8F-4167-9331-23EA64E2B631" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EB9295A-8832-4670-B268-FBD0BC086447" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB165123-26C6-4D9F-90DA-96112B628702" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3D8E340-AE91-4F29-9F22-E0CE6718FC13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_silver_4309y_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EBE15F3-8B56-444A-9956-7FC9AF7D3345" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB267830-FA6E-4C2E-8BBE-C3DA12A6A33D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6348_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53075C98-C062-4338-BD9B-4013ED9E139C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DE5D09C-3272-4810-9F41-97BDBBFE4160" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_silver_4310_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "678E18FE-BA19-4C86-ADF4-B776318F5D12" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D557D68C-8279-4BFD-9EA6-17A83754B8FF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6338t_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3ECF4055-8163-47A2-9767-D4CC0D34CCDB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A551BBB-76CD-4C26-913F-B02C66E5D846" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_5318s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "315C9B38-2572-4B6A-A8AF-5D16553A3A30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED598260-2A9B-46F7-AA85-0DA97DA0D42D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6336y_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CAA2CF5-808C-4157-A730-4301ED88B659" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "489BD4AC-50C6-422B-A2B2-00A70E611114" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_5318n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B12E1696-DE9D-40B5-97F1-E9157AED4A7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2C5D3DE-5506-4F16-B7F9-5032A1277D23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6312u_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A1C9968-0AD3-4E96-A721-6EA6C0BF6209" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF7D9572-8D03-4D54-B0E1-C0A3F3F90FCF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_silver_4310t_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "156C3A26-74CB-4E99-AE8A-5B49424AB857" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ECA0BC9-1CA4-4B95-B98F-9098B2550309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_5320t_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57BA492F-6F69-4598-AAF1-156BF98F34E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDA47606-176C-4F6B-A316-4C536B63FA4E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_5320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "48A5F3C2-DE31-48CC-A5DF-C7A9F9CD089A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DD98889-58A1-4A5A-B79A-B2DA9EDA63DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_5315y_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56862563-A4A5-4444-886D-E17C99A87142" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6839AE9B-9A8A-4312-80FC-0549C675A815" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8352m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1E2981E-8DCA-4DB7-8E5B-B0D94B508303" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5230F6AF-88CB-4EE2-B292-8B9A7217D10F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8362_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB219989-055E-4D04-8738-7AF4E66E3A57" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91EB66B4-8F1B-4F35-9371-17FB761997CB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8368_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A150305A-B59C-4C93-B0CB-93A6F408334F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBDFD1AF-2716-4C95-ADFF-79EFA915C286" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8358_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8710FEA6-3A6D-4F2E-8E41-57CC96231A5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCE086F8-5C8B-4F0C-B53A-76BD4E67B678" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8352y_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2FACD9F-6BB6-4D8C-9E35-0EDCD900C20B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8FB7EE6-6808-4879-A0A3-E85FE5CB37CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6338_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CAF70C32-227B-4263-8BE8-73F876B3A465" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C5694238-F4E5-4689-ADD2-67C25762ED92" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6330n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCC28C3D-B261-4554-B944-4C2E56EBE8EB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20821868-F7D2-4132-8D63-98E1089DB46C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5EAD7AA-B67C-4864-94D3-DBE56119A667" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33FA0279-D587-471E-8EC0-211F78DA4DFD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8351n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2ED7EDF-A382-4E0D-BF3B-638D0F8830CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D7C504C3-7EEE-4A0F-8589-19C1E806E690" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8368q_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A443FB47-021C-4B5F-84D2-C2612DDF5893" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5390A12B-80BD-4889-BF0F-95E65D10D037" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8352s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "441CAAE3-9CC4-4C78-A4A3-CCCDDF2D9F24" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B45C39D-03E8-46C1-88DD-94E382F4A961" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8358p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6CF7B9C-80B6-4E9A-B581-A7E8D0B493FA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00B21B5C-0FDE-4A8E-A9FC-5CF822A74B20" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8352v_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79B26858-BA9D-4DC4-B19F-A37D98E5D567" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF2DC691-025A-441E-AAC2-C8583F54733D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8360hl_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22EB43AC-A091-4FF6-AE2D-FCCBFF49B7BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA925F96-6DDD-4F71-BF13-710C8A89D860" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8360h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5D03D31-328A-4AD5-88D4-037A4317F61D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB15368B-21A1-429E-8B9C-A095C4E8BA67" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8356h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3816252E-5421-442E-B8F3-C3A6B78F3B6E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB6DEAA1-3209-4B49-B931-43E8C1C5BE14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6330h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73DEE8C8-6216-47C1-A5E9-007842AF111D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6C4A47D-7F66-4ACC-9C69-0A355D46CDC1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8380h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0AA8576-BB5B-4128-92B3-50F839A5305B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1CC27DB-11D4-412A-BC69-CF32A0CABCF8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_5318h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD8048C0-45BB-4532-BD0C-98C8723C7862" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43808CCF-1EF0-41CE-983D-DD6BB775895E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6328h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BBC16B4-09E6-4122-9A7D-B2DD0C82C1BA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "710DBCD5-788D-4140-AC16-EC6E126CFA66" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_5320h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D25841AF-F1D2-4862-826F-A194B843B86E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3BF1F73B-4736-40BC-9053-951B5BF1059E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8353h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9373835F-E7B5-442F-B11A-A46771B2D695" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBE07EA7-4CDF-4038-A948-6AC126C7F6AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8354h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "574533C8-52E2-445A-8C57-2357892468EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06A2241C-37AE-41AE-A8D1-D9AB18CCE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6348h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EBE74D3-855F-4726-B265-A7DF93121A94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59C5122F-D822-4E71-A417-88EB51F1786B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8376h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7428FE4A-4CA2-44AA-A412-81C6CC15FA04" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C1D6444A-B9CF-4D70-A8A9-E6B57B6F13DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8376hl_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3506304-A3F5-482B-BFB9-2C4E0D5D8D94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05637A96-AF09-4FF5-A918-AB369AA2D1CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_platinum_8380hl_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896731D5-B752-49F5-BD8E-924385C0E6F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8FE9694-F0E7-4B45-82A1-065DA96B9794" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:xeon_gold_6328hl_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CAF6929-D8FE-4A6E-BB9F-E736680487B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A767EC83-AAED-4FEA-A35E-A503369FE4FB" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46794.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46794.json index 50f0f17aa4b..1e5be40bd67 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46794.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46794.json @@ -2,19 +2,4595 @@ "id": "CVE-2021-46794", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T20:15:12.463", - "lastModified": "2023-05-09T20:27:45.710", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:57:11.767", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Insufficient bounds checking in ASP (AMD Secure\nProcessor) may allow for an out of bounds read in SMI (System Management\nInterface) mailbox checksum calculation triggering a data abort, resulting in a\npotential denial of service.\n\n\n\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5300g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "0F8377AD-71DD-424D-81DB-BA52C412F365" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D857EFE-B24E-4228-BB1E-34F9BC763A11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5300ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "EA4414D7-8BF0-45F2-B3C5-AFD5BBB7153C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6CC472B-1502-402D-B2AC-8A63A69F2A27" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5500_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "BF7AEB98-ABB8-4D28-A5D3-717D7FC8A39F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFB24DB1-A6E6-4628-B35E-08F2AD2775C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5600_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6252E099-E6E1-4EEC-80F9-96CBC77E5361" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC9F829-1987-48BD-B77D-CF2DCFA0EB63" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5600g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "7AC9BC57-0585-4734-A542-8CE4CC084D32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8937FABB-B60E-4780-BB6D-B1B99DD69219" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5600ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "62DAE85A-DB5D-4FD0-80CD-6CBBC8B406CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B83F1F6-64B1-40D3-817A-E27CEB2E93EC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5600x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "04D4DBFD-AB05-4DA9-91AE-D787BD6F1DD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5700g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "EBE6D58C-E392-4D54-9ACB-22C06CB794DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5700ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "06413261-E5CC-4F3C-A2D7-2F747233D4C5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA1A9BEC-27AB-40AD-BBED-4420451D3793" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5700x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "4D0DF74F-72F5-4832-B534-91BCBD0BD192" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5700x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B2FC8D5-A4CC-433F-AC14-D2EF1971A36E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5800_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "B5CE4659-0718-4702-A241-43F6E8ACE15E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF250F8D-F113-49D5-BC25-A0BA9FD403FD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5800x3d_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "1FA79D4A-BB1D-43F3-A750-9220CFD36614" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "238EA54F-4809-4D8F-9F18-71135FED9D05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5800x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "8240ABD6-3AED-4512-8CCC-809F19935C21" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "48F6B331-4C0F-49FF-A39F-381B9ADE3483" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5900_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "F5AE81BE-206B-4B7A-8454-71119D58D0A5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "485A41D3-D266-4FBB-B381-DF585957D3AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5900x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "58B46B1C-B3D1-4B6E-A1FD-3A9C65B66559" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "050C802C-D8C7-4D58-BA6E-AC48EEF25215" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5945wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "BBC3537B-FA9D-4E92-977E-0566179C18EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5945wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D541CC0A-DBAC-440C-80A1-DBE153D7E0B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5950x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "C752AEEC-B710-4DE0-AB15-0FB84AC616E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD9478CC-DF88-4833-BBB2-2D82D9BBFA63" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5955wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "24A06633-820E-44B8-B6ED-F5D5282AB149" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5955wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0AD18B6-091C-4017-9448-2F0A3EBA70F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5965wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "722D9CC1-5D4B-47CF-8CC8-1D4FFC81FCD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5965wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "797DAA58-A85C-433D-91AC-28A9F2AB3D60" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5975wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "2707FAB4-B5DA-4419-A774-2FA759B9B6B0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5975wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC0E50CF-D4EA-430D-B4FA-491F59B09A73" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_5995wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "68D43724-06C3-4C12-AB3C-F0BC0C672110" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_5995wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "608C1128-2346-4D64-9030-EAE4EB41D285" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3100_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "82432C6B-2A98-4884-B1B3-912998BCC721" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C015E367-8E68-40F0-B1AF-7C61C98E8C73" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3100_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "2FCB8964-9022-47E4-B796-0A80FE0E2355" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C015E367-8E68-40F0-B1AF-7C61C98E8C73" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3100_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "05DE9F2D-3B9C-47DE-87AF-92CBC21D726F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C015E367-8E68-40F0-B1AF-7C61C98E8C73" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3100_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "67C20E99-68F0-4EFE-A786-FEF185555464" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C015E367-8E68-40F0-B1AF-7C61C98E8C73" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3100_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "22CD994F-2746-4BA6-8369-A1E4A06FBDA6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C015E367-8E68-40F0-B1AF-7C61C98E8C73" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "28B131DD-812D-4B15-A12E-5F2AC87BC132" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3300x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D6F72-608C-4EE5-B666-69418CF56D85" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "C84BC1CA-17E0-4924-8CCE-5600699ECC61" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3300x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D6F72-608C-4EE5-B666-69418CF56D85" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "DA906CE3-B570-493C-AEC1-5964A761459F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3300x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D6F72-608C-4EE5-B666-69418CF56D85" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3300x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "42DF9AAA-771F-4229-8BAA-225B216E87BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3300x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D6F72-608C-4EE5-B666-69418CF56D85" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3300x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "EC22CDD1-69B1-45D0-9FC0-79DB2E17E18B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3300x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D6F72-608C-4EE5-B666-69418CF56D85" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3500_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "BD68B857-969C-42E5-B663-E1A14A8C0F2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "286BEE93-D87A-4715-AECE-088DAE7AA50F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3500_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "6126E989-C1BA-4554-888D-61BB7B887023" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "286BEE93-D87A-4715-AECE-088DAE7AA50F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3500_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "50531624-3B80-4000-8B7B-32C08832C875" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "286BEE93-D87A-4715-AECE-088DAE7AA50F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3500_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "690A0BC5-2FB7-43F4-8595-8CFD87B7FD81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "286BEE93-D87A-4715-AECE-088DAE7AA50F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3500_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "E62075E7-6D8A-4F28-A5A9-287ABD2FC34D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "286BEE93-D87A-4715-AECE-088DAE7AA50F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "2461496A-4C9D-4F09-9031-7780B4D9060B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3500x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABCE38CA-AC74-44AA-91F3-9031EB3BFEE3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF59E23-7537-4362-990B-ED495D4D7061" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3500x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABCE38CA-AC74-44AA-91F3-9031EB3BFEE3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "665D432A-A56A-4B66-9BE9-9DC19F3B6D9B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3500x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABCE38CA-AC74-44AA-91F3-9031EB3BFEE3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3500x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "C625511A-4FEA-42D7-99A8-3A1F545867FE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3500x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABCE38CA-AC74-44AA-91F3-9031EB3BFEE3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3500x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "6FD9E8B4-AF15-474C-9A29-6286C728BE55" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3500x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABCE38CA-AC74-44AA-91F3-9031EB3BFEE3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3600_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "EE48C033-B6FF-4CAA-82D2-1266C268631A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "881E03BE-79B7-407D-A258-71387A2F78F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3600_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "133107D3-4FFA-4116-A335-359B799D8E69" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "881E03BE-79B7-407D-A258-71387A2F78F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3600_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "3FF7E224-3E5B-4560-835C-3803CEB06A41" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "881E03BE-79B7-407D-A258-71387A2F78F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3600_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "AFC1997F-9DD5-4EB1-AC82-0BE711EB09C3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "881E03BE-79B7-407D-A258-71387A2F78F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3600_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "3483A4C7-AE79-48A7-BEE2-7FB96010A5B6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "881E03BE-79B7-407D-A258-71387A2F78F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "07860820-0BEC-4E77-80A4-212808C388FA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5BFE12C-60BF-48D1-A580-8ED687C9FD64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "CB023952-CE01-499C-9122-E6350C8B9E52" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5BFE12C-60BF-48D1-A580-8ED687C9FD64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "D9E6CBF4-6EF9-4B64-8F82-F5A74A6906B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5BFE12C-60BF-48D1-A580-8ED687C9FD64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3600x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "28439A0A-DB79-4D03-98E8-76666DCDD0FE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5BFE12C-60BF-48D1-A580-8ED687C9FD64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3600x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "8E6EFFD2-14BE-4599-BFC3-81FB12A0F285" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5BFE12C-60BF-48D1-A580-8ED687C9FD64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "A7442CCB-01C8-4EC4-90DA-F653001A2044" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3600xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1696132C-054B-4263-A34E-069DA28F0FE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EC06065D-97B5-48B2-8D6D-AFE947319946" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3600xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1696132C-054B-4263-A34E-069DA28F0FE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "F82E33B0-27A4-4D78-970D-02DBA887CF93" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3600xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1696132C-054B-4263-A34E-069DA28F0FE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3600xt_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "7641A1BB-FEA9-4E73-B281-144AEAB8ACCD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3600xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1696132C-054B-4263-A34E-069DA28F0FE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3600xt_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "8679FB78-8EE7-4857-95F9-552A8484682F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3600xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1696132C-054B-4263-A34E-069DA28F0FE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0729C73A-AFF9-483D-8668-9AFD28FF4E01" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3800x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79160DBB-1801-4A42-A37F-873CDFBC87D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "59D2C6FA-8F45-42DE-A197-71984E650EA6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3800x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79160DBB-1801-4A42-A37F-873CDFBC87D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "98E3AC94-338B-4CAE-8B36-9B372D619F24" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3800x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79160DBB-1801-4A42-A37F-873CDFBC87D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3800x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "46CDBBC9-E03B-49C4-AFFA-E7C1A568CD9B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3800x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79160DBB-1801-4A42-A37F-873CDFBC87D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3800x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "2ECFC642-4D8C-4BAF-BD6C-67BDD6AEF46E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3800x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79160DBB-1801-4A42-A37F-873CDFBC87D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "D0491027-9353-43C1-927C-9E24674AE2CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3800xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4ED8D4C-BDA3-4278-B288-6B4599821F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "11B1C777-A018-472B-A94B-337B38D37F3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3800xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4ED8D4C-BDA3-4278-B288-6B4599821F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "6D2AAEA0-3D91-4255-966E-A9F6C418BCE3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3800xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4ED8D4C-BDA3-4278-B288-6B4599821F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3800xt_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "1C75687A-EAB1-458E-802D-01369DD63042" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3800xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4ED8D4C-BDA3-4278-B288-6B4599821F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3800xt_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "5DADF4DA-2F61-4FE2-89A1-003EF75B3494" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3800xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4ED8D4C-BDA3-4278-B288-6B4599821F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3900_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "153A32ED-0E61-40EC-A48B-5A0872D4D771" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "551D58F2-4CCB-498D-854A-0536EAFCFF96" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3900_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EF9CA8C7-8EB0-4B7A-8212-C1D1248199AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "551D58F2-4CCB-498D-854A-0536EAFCFF96" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3900_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "A2B50F6F-461A-42AD-8D3D-EB8B630B9638" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "551D58F2-4CCB-498D-854A-0536EAFCFF96" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3900_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "A86B642D-29AB-483F-8968-F07C5368B022" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "551D58F2-4CCB-498D-854A-0536EAFCFF96" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3900_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "74DD0BBD-47F0-4DC0-84C8-26284A4EBE57" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "551D58F2-4CCB-498D-854A-0536EAFCFF96" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "B70765D1-E9C5-478E-8514-ED186ADCCFDD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3900x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AE379C7-EE6F-46F7-A787-26EB7343D733" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D85B7F58-9BFB-4113-94D1-272C53848ECF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3900x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AE379C7-EE6F-46F7-A787-26EB7343D733" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "DF1E2805-D7B3-4F3A-A3E2-0BF576350889" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3900x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AE379C7-EE6F-46F7-A787-26EB7343D733" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3900x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "FFBD9686-8147-4233-8883-5D8CA441AAED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3900x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AE379C7-EE6F-46F7-A787-26EB7343D733" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3900x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "AD7100B0-34C4-4B48-86C3-59900B1D8FFF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3900x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AE379C7-EE6F-46F7-A787-26EB7343D733" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "71726BA2-DA3A-4B39-9CB5-F2B1E2112F4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3900xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBB763AD-4D9C-44AA-90A3-225E579FF1A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "6F9A587A-F00D-433D-AC4A-6EE1EA15BBFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3900xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBB763AD-4D9C-44AA-90A3-225E579FF1A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "7F9C3B54-20BE-40EB-8EE9-75C5A570D372" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3900xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBB763AD-4D9C-44AA-90A3-225E579FF1A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3900xt_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "AA68A4F8-845D-4008-8AF4-64170CB02C9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3900xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBB763AD-4D9C-44AA-90A3-225E579FF1A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3900xt_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "473B7CF0-BF3B-409C-8195-1F4792071CBC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3900xt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBB763AD-4D9C-44AA-90A3-225E579FF1A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "E1C74B15-7443-4E43-ADC7-726AAFEABF48" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "560E511C-5D2C-4DEE-B955-FA21F310CA0B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "DDCBEBEE-E86D-4D50-90F4-7B09220D8757" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "560E511C-5D2C-4DEE-B955-FA21F310CA0B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "6C7580CA-3B04-4EB4-B2E1-7A0B83AC1528" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "560E511C-5D2C-4DEE-B955-FA21F310CA0B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3950x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "101730EA-AA39-4BE5-B402-6F190444D118" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "560E511C-5D2C-4DEE-B955-FA21F310CA0B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_3950x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8764CB-6211-427A-B854-259132A6A203" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_3950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "560E511C-5D2C-4DEE-B955-FA21F310CA0B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_1200_\\(af\\)_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "D1EA533C-BA5F-404D-9F7B-437237F5304F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_1200_\\(af\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "726E39BB-3D78-4C2D-B797-20D0E20FB74C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_1200_\\(af\\)_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "DDBD760E-9CDF-400D-9DEB-7E36A4C41259" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_1200_\\(af\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "726E39BB-3D78-4C2D-B797-20D0E20FB74C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_1200_\\(af\\)_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "3951CBB3-30B5-4426-B7D7-581E2D566EB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_1200_\\(af\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "726E39BB-3D78-4C2D-B797-20D0E20FB74C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_1200_\\(af\\)_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "5B229626-D3F2-4953-B066-DAF3FD122D37" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_1200_\\(af\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "726E39BB-3D78-4C2D-B797-20D0E20FB74C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_1600_\\(af\\)_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "92809605-3486-4075-922F-B44F38F524A9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_1600_\\(af\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F1F4FB2-29DA-4360-89D4-2C6E9B7E9E21" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_1600_\\(af\\)_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "B5916435-C1D9-42AA-84E7-02385D8EEE5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_1600_\\(af\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F1F4FB2-29DA-4360-89D4-2C6E9B7E9E21" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_1600_\\(af\\)_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "7E4340A9-5E01-4E5B-880A-B37118140D13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_1600_\\(af\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F1F4FB2-29DA-4360-89D4-2C6E9B7E9E21" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_1600_\\(af\\)_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "98ADAFDC-86C9-4EBD-AFE7-8B803C5D0696" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_1600_\\(af\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F1F4FB2-29DA-4360-89D4-2C6E9B7E9E21" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2200g_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "C8B064F0-34B5-4891-BDDC-2C3975245770" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2200g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BDCFAAB-57E1-4FED-9ADB-1B5D33A82455" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2200g_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "398FE91B-A644-48A4-B6DE-941503776A8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2200g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BDCFAAB-57E1-4FED-9ADB-1B5D33A82455" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2200g_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "5A58E098-AAAF-45F7-BC6B-FBF658B063B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2200g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BDCFAAB-57E1-4FED-9ADB-1B5D33A82455" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2200g_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "F7B8D745-F55B-4981-81E5-EE0D32688F24" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2200g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BDCFAAB-57E1-4FED-9ADB-1B5D33A82455" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2200ge_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "9C7FC633-A002-4D1D-ADBB-F8B64416EAE7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2200ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE5747BB-1D4C-4E63-8478-9E6F270157D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2200ge_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "C0A32023-8F49-43DC-AF9E-BDD4ED8C7176" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2200ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE5747BB-1D4C-4E63-8478-9E6F270157D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2200ge_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "10C88E4F-64EE-4D44-8560-860E79864070" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2200ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE5747BB-1D4C-4E63-8478-9E6F270157D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2200ge_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "67C08FF7-52DE-4A09-BEAD-774765362D0D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2200ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE5747BB-1D4C-4E63-8478-9E6F270157D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "F3282888-7C4D-49DF-A807-7F40113BC52B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2300x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B146EE20-7CF4-4A5C-A237-459A82DDFDF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2300x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "F4019B34-B0B4-4EC0-831A-DE50B63BF6A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2300x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B146EE20-7CF4-4A5C-A237-459A82DDFDF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2300x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "07C9D8CC-F7F0-440A-B75F-416045931B5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2300x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B146EE20-7CF4-4A5C-A237-459A82DDFDF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2300x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "DE370788-ACCC-41BE-8DB9-4360D1D5BA3D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2300x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B146EE20-7CF4-4A5C-A237-459A82DDFDF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2400g_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "44C5E66C-7E26-4C9B-AD54-5860FA8F01E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2400g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ADD4F80-E96D-4F57-B109-621BF88E9F6F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2400g_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "3D2C8D63-649E-4453-B9D8-47D32DB4D948" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2400g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ADD4F80-E96D-4F57-B109-621BF88E9F6F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2400g_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "C407BD65-34E8-42F3-8FD5-433F28583FE5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2400g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ADD4F80-E96D-4F57-B109-621BF88E9F6F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2400g_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "E39CD0F5-EFFA-4C10-9E48-8C896A2A1C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2400g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ADD4F80-E96D-4F57-B109-621BF88E9F6F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2400ge_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "3A8DA8CC-B48E-4948-ACFA-669F82AE14CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2400ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB4757D3-1AE8-4B27-A4D8-D5E0A0D91D27" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2400ge_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "8AF57210-C8DC-4022-BC3E-990AA74A0825" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2400ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB4757D3-1AE8-4B27-A4D8-D5E0A0D91D27" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2400ge_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "47446553-D92C-4C2F-93A9-37409250AF81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2400ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB4757D3-1AE8-4B27-A4D8-D5E0A0D91D27" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2400ge_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "B0697F68-54A3-4564-BBD5-7A5EDF6F4772" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2400ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB4757D3-1AE8-4B27-A4D8-D5E0A0D91D27" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2500x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "13C9ACB4-841D-41D6-B6FF-9BB6F674EB9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2500x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D01D15CF-8424-4629-B76B-42987D17723D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2500x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "8F377F47-82FA-4511-BA14-8E4C4B553245" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2500x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D01D15CF-8424-4629-B76B-42987D17723D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2500x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "CC3197CE-6698-4D7D-B7F1-24B0EC2A0CBA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2500x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D01D15CF-8424-4629-B76B-42987D17723D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2500x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "22106B54-24C5-4D63-A04B-36DBD06698D5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2500x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D01D15CF-8424-4629-B76B-42987D17723D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2600_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "AD6AAA87-0D34-4EE8-A322-BF8FD8C21B79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26955A02-B9BC-459D-96B3-632FC105CADB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2600_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE07A25-443E-4BBB-976C-C552A047895D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26955A02-B9BC-459D-96B3-632FC105CADB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2600_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "798F27FB-B92A-42AD-ABDE-85D3A25B2F5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26955A02-B9BC-459D-96B3-632FC105CADB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2600_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "A60E158C-1F93-4B41-B708-24FFB6C528A9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26955A02-B9BC-459D-96B3-632FC105CADB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2600e_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0E38901D-B9B1-48EC-8A69-A127E8C39F92" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2600e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BEB01D5-1E76-497D-A1C1-7E9EAF20EB6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2600e_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "2C64C289-95D1-44B3-91CA-773E5BF31305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2600e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BEB01D5-1E76-497D-A1C1-7E9EAF20EB6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2600e_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "050478B1-A440-44A1-B921-9ED079ACE8D5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2600e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BEB01D5-1E76-497D-A1C1-7E9EAF20EB6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2600e_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "42CA0B13-C331-4F70-B62C-3172636B9991" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2600e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BEB01D5-1E76-497D-A1C1-7E9EAF20EB6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2600x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "9A4357F4-BA27-4825-97B3-ABF56260691F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF956F44-3E32-44DE-83A2-8FB6C6D97F2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2600x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "ACE22480-31B1-41C7-A540-49CBB07074EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF956F44-3E32-44DE-83A2-8FB6C6D97F2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2600x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "1DA3C9C8-B380-4B69-817D-7B5911AFE01F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF956F44-3E32-44DE-83A2-8FB6C6D97F2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2600x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "52370CEA-97A9-40D4-A999-DA091EF97336" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF956F44-3E32-44DE-83A2-8FB6C6D97F2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2700_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "92AB631E-01F4-4824-B7D8-53BCE2DF026C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD90ED8-CD7A-4946-A6B6-EB4ECF817442" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2700_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "59327F62-97D5-4E5B-8896-4F097DA8E16C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD90ED8-CD7A-4946-A6B6-EB4ECF817442" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2700_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "A1F5A161-6DAB-452C-AC79-602EFE015F8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD90ED8-CD7A-4946-A6B6-EB4ECF817442" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2700_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "DA65997C-FED5-42FA-8009-DFF0B3A954AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD90ED8-CD7A-4946-A6B6-EB4ECF817442" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2700e_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "142477F6-2AAF-4458-B6E0-A559DA497EA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2700e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4558B0C-A788-4526-983D-4CD18DB55573" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2700e_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "29549B4C-FF0B-48D2-868C-94541F772895" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2700e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4558B0C-A788-4526-983D-4CD18DB55573" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2700e_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "E4E8F765-F72A-4401-B218-23F101ACB0A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2700e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4558B0C-A788-4526-983D-4CD18DB55573" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2700e_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "F037F86B-68CE-4835-8D8B-C0842C425DE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2700e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4558B0C-A788-4526-983D-4CD18DB55573" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2700x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "9ECA0A8C-CF74-4474-9D91-E55EDC728B07" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2700x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87F9F2EF-E800-4A61-8CB0-E26D88A34C81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2700x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "523A9C33-B0EB-4EEA-AD59-5D864CA89DFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2700x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87F9F2EF-E800-4A61-8CB0-E26D88A34C81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2700x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "ECA7656E-8FBB-450F-8685-AF0574C5D062" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2700x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87F9F2EF-E800-4A61-8CB0-E26D88A34C81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2700x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D91750-77EC-4928-96E6-021CEA28AE2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2700x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87F9F2EF-E800-4A61-8CB0-E26D88A34C81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2920x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "02A294A8-51C5-4155-9E5F-17AA24B288C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2920x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08F2EC09-FB07-46BB-B3DA-490538071EB3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2920x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "4E7B74F2-FDF1-4F6D-B9C1-077EDF6BC752" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2920x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08F2EC09-FB07-46BB-B3DA-490538071EB3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2920x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "DD6634D8-75F3-4D52-81EB-0FAFE3F447E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2920x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08F2EC09-FB07-46BB-B3DA-490538071EB3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2920x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "2F849004-49E3-4A2D-ABB4-3C13F71151C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2920x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08F2EC09-FB07-46BB-B3DA-490538071EB3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2950x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "D6A754B7-5EE2-4DDF-9AED-33BC64C226E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55F7C9E2-FE30-4250-BD6A-B3BDEBBFFC4E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2950x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "8CDB4588-A438-4FCD-BDB4-160C063160FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55F7C9E2-FE30-4250-BD6A-B3BDEBBFFC4E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2950x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "1E92FF4E-B638-4DD3-8679-DC83C3013B89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55F7C9E2-FE30-4250-BD6A-B3BDEBBFFC4E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2950x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "48ABA0CD-1B8C-4F06-8BB7-BB7EE76C3D13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2950x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55F7C9E2-FE30-4250-BD6A-B3BDEBBFFC4E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2970wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "1F5BBE25-797C-4219-BAA7-7C1305E6475D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2970wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7AAE11C-316F-44C1-A2AA-4A6C4D48F6D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2970wx_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "3867BD41-D9FB-42A5-98AE-C5F4DFBF4C8E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2970wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7AAE11C-316F-44C1-A2AA-4A6C4D48F6D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2970wx_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "A5D1863E-74FC-4867-81C4-3A477A4B208A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2970wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7AAE11C-316F-44C1-A2AA-4A6C4D48F6D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2970wx_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "A6802587-4F15-4E73-98EB-C2F4AC87A521" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2970wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7AAE11C-316F-44C1-A2AA-4A6C4D48F6D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2990wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "6B3D8277-8604-443B-AD45-93DD85574246" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2990wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13824CC7-ED52-4E7A-8392-AF54987E6392" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2990wx_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "294203E7-D92F-4958-BA44-E720743C4970" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2990wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13824CC7-ED52-4E7A-8392-AF54987E6392" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2990wx_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "B2EC0AAE-2C17-4B57-9E8E-6E48D2E5D2CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2990wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13824CC7-ED52-4E7A-8392-AF54987E6392" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_2990wx_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "91BE2EDD-859F-45CD-B7F0-ECEAB84BDF36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_2990wx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13824CC7-ED52-4E7A-8392-AF54987E6392" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_pro_2100ge_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0FB9BF88-4628-4483-BD8C-A23A84EDC04D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_pro_2100ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F389C20A-536D-4A6F-BF8B-B56AA2B857D0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_pro_2100ge_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "3922889D-799F-485F-8745-1AB1B558A001" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_pro_2100ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F389C20A-536D-4A6F-BF8B-B56AA2B857D0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_pro_2100ge_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2EB3AC-73EA-4017-9892-EF59764B5551" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_pro_2100ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F389C20A-536D-4A6F-BF8B-B56AA2B857D0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:ryzen_pro_2100ge_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", + "matchCriteriaId": "E4D0CE08-2485-4A7E-8C7E-202311E4CDCD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:ryzen_pro_2100ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F389C20A-536D-4A6F-BF8B-B56AA2B857D0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "33F9B194-9165-4223-9358-3AC2392B7BA3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:pollockpi-ft5_1.0.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C946B802-709C-48FF-8D12-E1FE341F5212" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_3150ge_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "96F4E95F-EB57-4C80-9DB1-D042F8ED6635" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_3150ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11D12DB6-A9E9-4BEA-BC80-D6672A3383CD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_gold_3150ge_firmware:pollockpi-ft5_1.0.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "177CE442-7CA0-4BE4-8D4F-F5E5F47854D4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_gold_3150ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11D12DB6-A9E9-4BEA-BC80-D6672A3383CD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_silver_3050ge_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", + "matchCriteriaId": "4F814932-5F12-452E-825C-ADA4B8074EF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_silver_3050ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD0332AB-3568-4AF7-9738-3CF2923C6DDA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:athlon_silver_3050ge_firmware:pollockpi-ft5_1.0.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "859CC95A-AEEF-4E57-B5DF-6BB9684BF911" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:athlon_silver_3050ge:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD0332AB-3568-4AF7-9738-3CF2923C6DDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-363xx/CVE-2022-36330.json b/CVE-2022/CVE-2022-363xx/CVE-2022-36330.json index be0b061bd2a..dc4d524a2da 100644 --- a/CVE-2022/CVE-2022-363xx/CVE-2022-36330.json +++ b/CVE-2022/CVE-2022-363xx/CVE-2022-36330.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36330", "sourceIdentifier": "psirt@wdc.com", "published": "2023-05-10T00:15:09.467", - "lastModified": "2023-05-10T23:15:09.573", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:58:05.840", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + }, { "source": "psirt@wdc.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + }, { "source": "psirt@wdc.com", "type": "Secondary", @@ -46,10 +76,127 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:westerndigital:my_cloud_home_duo_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.4.0-191", + "matchCriteriaId": "0A0368E6-53C8-4BD2-B0E8-44464B245832" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:my_cloud_home_duo:-:*:*:*:*:*:*:*", + "matchCriteriaId": "124BBC79-65A2-465C-B784-D21E57E96F63" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:westerndigital:my_cloud_home_duo_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.4.0-191", + "matchCriteriaId": "0A0368E6-53C8-4BD2-B0E8-44464B245832" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:my_cloud_home_duo:-:*:*:*:*:*:*:*", + "matchCriteriaId": "124BBC79-65A2-465C-B784-D21E57E96F63" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:westerndigital:sandisk_ibi_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.4.0-191", + "matchCriteriaId": "13A2FB91-CCCF-42B1-BCE1-F4962D353593" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:sandisk_ibi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "296ADA43-16BA-4444-B472-DB945FB917B2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:westerndigital:my_cloud_home_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.4.0-191", + "matchCriteriaId": "D471C39A-0854-4755-9DF8-5BAABAB09619" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:westerndigital:my_cloud_home:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BE2FBAB-5BA0-4F09-A76E-4A6869668810" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.westerndigital.com/support/product-security/wdc-23003-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-9-4-0-191", - "source": "psirt@wdc.com" + "source": "psirt@wdc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23797.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23797.json index 4e72df74afe..4e64b1f9623 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23797.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23797.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23797", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-22T11:15:09.237", - "lastModified": "2023-05-22T11:15:09.237", - "vulnStatus": "Received", + "lastModified": "2023-05-22T13:21:34.157", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-255xx/CVE-2023-25537.json b/CVE-2023/CVE-2023-255xx/CVE-2023-25537.json index 304bd15574b..9e05113c90f 100644 --- a/CVE-2023/CVE-2023-255xx/CVE-2023-25537.json +++ b/CVE-2023/CVE-2023-255xx/CVE-2023-25537.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25537", "sourceIdentifier": "security_alert@emc.com", "published": "2023-05-22T11:15:09.333", - "lastModified": "2023-05-22T11:15:09.333", - "vulnStatus": "Received", + "lastModified": "2023-05-22T13:21:34.157", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2597.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2597.json new file mode 100644 index 00000000000..747bb20d3ce --- /dev/null +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2597.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-2597", + "sourceIdentifier": "emo@eclipse.org", + "published": "2023-05-22T12:15:09.760", + "lastModified": "2023-05-22T13:21:34.157", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In Eclipse Openj9 before version 0.38.0, in the implementation of the shared cache (which is enabled by default in OpenJ9 builds) the size of a string is not properly checked against the size of the buffer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "emo@eclipse.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "emo@eclipse.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/eclipse-openj9/openj9/pull/17259", + "source": "emo@eclipse.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26116.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26116.json index f8859218ba2..cc381b0aac7 100644 --- a/CVE-2023/CVE-2023-261xx/CVE-2023-26116.json +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26116.json @@ -2,12 +2,12 @@ "id": "CVE-2023-26116", "sourceIdentifier": "report@snyk.io", "published": "2023-03-30T05:15:07.410", - "lastModified": "2023-04-05T14:28:59.970", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-22T13:15:09.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the angular.copy() utility function due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking." + "value": "Versions of the package angular from 1.2.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the angular.copy() utility function due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking." } ], "metrics": { @@ -85,6 +85,18 @@ } ], "references": [ + { + "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406320", + "source": "report@snyk.io" + }, + { + "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406322", + "source": "report@snyk.io" + }, + { + "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406321", + "source": "report@snyk.io" + }, { "url": "https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373044", "source": "report@snyk.io", diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26117.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26117.json index 219a9ef00e7..cede446b7a3 100644 --- a/CVE-2023/CVE-2023-261xx/CVE-2023-26117.json +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26117.json @@ -2,12 +2,12 @@ "id": "CVE-2023-26117", "sourceIdentifier": "report@snyk.io", "published": "2023-03-30T05:15:07.687", - "lastModified": "2023-04-05T14:28:51.963", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-22T13:15:09.673", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking." + "value": "Versions of the package angular from 1.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking." } ], "metrics": { @@ -85,6 +85,18 @@ } ], "references": [ + { + "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406323", + "source": "report@snyk.io" + }, + { + "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406325", + "source": "report@snyk.io" + }, + { + "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406324", + "source": "report@snyk.io" + }, { "url": "https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373045", "source": "report@snyk.io", diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26118.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26118.json index 8be6609bc8b..3946806eb52 100644 --- a/CVE-2023/CVE-2023-261xx/CVE-2023-26118.json +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26118.json @@ -2,12 +2,12 @@ "id": "CVE-2023-26118", "sourceIdentifier": "report@snyk.io", "published": "2023-03-30T05:15:07.750", - "lastModified": "2023-04-05T14:28:41.663", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-22T13:15:09.757", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking." + "value": "Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking." } ], "metrics": { @@ -85,6 +85,18 @@ } ], "references": [ + { + "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406326", + "source": "report@snyk.io" + }, + { + "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406328", + "source": "report@snyk.io" + }, + { + "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406327", + "source": "report@snyk.io" + }, { "url": "https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373046", "source": "report@snyk.io", diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28709.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28709.json index 8dd090420a5..d712a1c884b 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28709.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28709.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28709", "sourceIdentifier": "security@apache.org", "published": "2023-05-22T11:15:09.423", - "lastModified": "2023-05-22T11:15:09.423", - "vulnStatus": "Received", + "lastModified": "2023-05-22T13:21:34.157", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2832.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2832.json index f3116538f8b..5d8c425c17a 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2832.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2832.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2832", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-22T11:15:09.493", - "lastModified": "2023-05-22T11:15:09.493", - "vulnStatus": "Received", + "lastModified": "2023-05-22T13:21:34.157", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31058.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31058.json new file mode 100644 index 00000000000..65ecb68c9e4 --- /dev/null +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31058.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-31058", + "sourceIdentifier": "security@apache.org", + "published": "2023-05-22T13:15:09.843", + "lastModified": "2023-05-22T13:21:34.157", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0. Attackers would bypass the\n'autoDeserialize' option filtering by adding\u00a0blanks. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick [1] to solve it.\n\n\n\n[1] \n\n https://github.com/apache/inlong/pull/7674 https://github.com/apache/inlong/pull/7674 \n\n\n\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/bkcgbn9l61croxfyspf7xd42qb189s3z", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31612.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31612.json index 53ad4fdbecd..3eb290c1ce2 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31612.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31612.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31612", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:11.813", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:25:16.543", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the dfe_qexp_list component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1125", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31613.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31613.json index 9a0017fba80..c372ce23a03 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31613.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31613.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31613", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:11.867", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:25:35.357", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the __nss_database_lookup component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1121", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31614.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31614.json index 02b311d1881..d6238bc8238 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31614.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31614.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31614", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:11.913", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:25:51.347", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the mp_box_deserialize_string function in openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1117", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31615.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31615.json index a135bb7915d..0a9c01eae03 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31615.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31615.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31615", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:11.963", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:26:03.427", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the chash_array component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1124", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31616.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31616.json index 829afa9552d..a5e2f7fa832 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31616.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31616.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31616", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.010", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:26:18.930", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the bif_mod component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1122", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31617.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31617.json index 4499cd5dbee..30dcf334ca2 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31617.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31617.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31617", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.057", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:26:31.713", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the dk_set_delete component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1127", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31618.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31618.json index 994b4fd9723..765b510fc4d 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31618.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31618.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31618", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.110", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:26:45.227", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the sqlc_union_dt_wrap component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1136", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31619.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31619.json index c8797e9066d..6e11dbfaf24 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31619.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31619.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31619", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.170", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:26:59.780", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the sch_name_to_object component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1133", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31620.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31620.json index 2ad6d445104..63d147498ce 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31620.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31620.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31620", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.237", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:27:12.930", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the dv_compare component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1128", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31621.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31621.json index abfd865be36..5e40c71ee81 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31621.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31621.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31621", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.300", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:50:12.233", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the kc_var_col component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1130", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31622.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31622.json index c3ba1e6199f..2378ead48ad 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31622.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31622.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31622", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.347", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:47:22.640", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the sqlc_make_policy_trig component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1135", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31623.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31623.json index 89cb3d73774..822de728112 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31623.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31623.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31623", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.390", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:47:00.637", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the mp_box_copy component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1131", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31624.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31624.json index 402251e31f9..f56791eeae6 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31624.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31624.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31624", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.437", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:31:35.687", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the sinv_check_exp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1134", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31625.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31625.json index 1fc6865c48a..b2267eed5c8 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31625.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31625.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31625", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.487", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:31:24.190", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the psiginfo component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1132", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31626.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31626.json index 67c7555a074..8825c3ea581 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31626.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31626.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31626", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.540", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:29:32.933", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the gpf_notice component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1129", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31627.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31627.json index 1b999a6cf38..3ba4bdbd776 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31627.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31627.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31627", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.587", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:29:51.783", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the strhash component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1140", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31628.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31628.json index 4e88f817bd8..93e8b2c90a6 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31628.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31628.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31628", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.633", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:30:01.657", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the stricmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1141", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31629.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31629.json index c00cb941c48..836b55b2400 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31629.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31629.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31629", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.677", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:30:15.663", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the sqlo_union_scope component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1139", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31630.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31630.json index 35c489d21b7..c994eb8f414 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31630.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31630.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31630", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.723", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:30:38.413", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the sqlo_query_spec component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1138", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31631.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31631.json index 2530d73c713..a3928bfea81 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31631.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31631.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31631", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.777", - "lastModified": "2023-05-15T15:20:32.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-22T13:30:53.093", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the sqlo_preds_contradiction component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", + "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1137", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31779.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31779.json new file mode 100644 index 00000000000..1cd4f6a4fa6 --- /dev/null +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31779.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-31779", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-22T13:15:09.913", + "lastModified": "2023-05-22T13:21:34.157", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Wekan v6.84 and earlier is vulnerable to Cross Site Scripting (XSS). An attacker with user privilege on kanban board can insert JavaScript code in in \"Reaction to comment\" feature." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/wekan/wekan/blob/master/CHANGELOG.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/wekan/wekan/commit/47ac33d6c234359c31d9b5eae49ed3e793907279", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index db6c2918019..630a5ad462e 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-22T12:00:27.102713+00:00 +2023-05-22T14:00:29.257326+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-22T11:36:12.143000+00:00 +2023-05-22T13:59:17.053000+00:00 ``` ### Last Data Feed Release @@ -29,56 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -215734 +215737 ``` ### CVEs added in the last Commit -Recently added CVEs: `12` +Recently added CVEs: `3` -* [CVE-2022-41608](CVE-2022/CVE-2022-416xx/CVE-2022-41608.json) (`2023-05-22T10:15:09.920`) -* [CVE-2022-44739](CVE-2022/CVE-2022-447xx/CVE-2022-44739.json) (`2023-05-22T10:15:10.337`) -* [CVE-2022-45076](CVE-2022/CVE-2022-450xx/CVE-2022-45076.json) (`2023-05-22T10:15:10.823`) -* [CVE-2022-45079](CVE-2022/CVE-2022-450xx/CVE-2022-45079.json) (`2023-05-22T10:15:11.203`) -* [CVE-2022-45376](CVE-2022/CVE-2022-453xx/CVE-2022-45376.json) (`2023-05-22T10:15:11.587`) -* [CVE-2022-47167](CVE-2022/CVE-2022-471xx/CVE-2022-47167.json) (`2023-05-22T10:15:11.957`) -* [CVE-2022-47183](CVE-2022/CVE-2022-471xx/CVE-2022-47183.json) (`2023-05-22T10:15:12.310`) -* [CVE-2022-47611](CVE-2022/CVE-2022-476xx/CVE-2022-47611.json) (`2023-05-22T10:15:12.683`) -* [CVE-2023-23797](CVE-2023/CVE-2023-237xx/CVE-2023-23797.json) (`2023-05-22T11:15:09.237`) -* [CVE-2023-25537](CVE-2023/CVE-2023-255xx/CVE-2023-25537.json) (`2023-05-22T11:15:09.333`) -* [CVE-2023-28709](CVE-2023/CVE-2023-287xx/CVE-2023-28709.json) (`2023-05-22T11:15:09.423`) -* [CVE-2023-2832](CVE-2023/CVE-2023-28xx/CVE-2023-2832.json) (`2023-05-22T11:15:09.493`) +* [CVE-2023-2597](CVE-2023/CVE-2023-25xx/CVE-2023-2597.json) (`2023-05-22T12:15:09.760`) +* [CVE-2023-31058](CVE-2023/CVE-2023-310xx/CVE-2023-31058.json) (`2023-05-22T13:15:09.843`) +* [CVE-2023-31779](CVE-2023/CVE-2023-317xx/CVE-2023-31779.json) (`2023-05-22T13:15:09.913`) ### CVEs modified in the last Commit -Recently modified CVEs: `39` +Recently modified CVEs: `32` -* [CVE-2023-22714](CVE-2023/CVE-2023-227xx/CVE-2023-22714.json) (`2023-05-22T10:56:50.933`) -* [CVE-2023-23680](CVE-2023/CVE-2023-236xx/CVE-2023-23680.json) (`2023-05-22T10:56:50.933`) -* [CVE-2023-23712](CVE-2023/CVE-2023-237xx/CVE-2023-23712.json) (`2023-05-22T10:56:50.933`) -* [CVE-2023-23813](CVE-2023/CVE-2023-238xx/CVE-2023-23813.json) (`2023-05-22T10:56:50.933`) -* [CVE-2023-32700](CVE-2023/CVE-2023-327xx/CVE-2023-32700.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-33244](CVE-2023/CVE-2023-332xx/CVE-2023-33244.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-22689](CVE-2023/CVE-2023-226xx/CVE-2023-22689.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-23890](CVE-2023/CVE-2023-238xx/CVE-2023-23890.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-24414](CVE-2023/CVE-2023-244xx/CVE-2023-24414.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-32589](CVE-2023/CVE-2023-325xx/CVE-2023-32589.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-2826](CVE-2023/CVE-2023-28xx/CVE-2023-2826.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-33250](CVE-2023/CVE-2023-332xx/CVE-2023-33250.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-33251](CVE-2023/CVE-2023-332xx/CVE-2023-33251.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-33252](CVE-2023/CVE-2023-332xx/CVE-2023-33252.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-33254](CVE-2023/CVE-2023-332xx/CVE-2023-33254.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-32336](CVE-2023/CVE-2023-323xx/CVE-2023-32336.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-33264](CVE-2023/CVE-2023-332xx/CVE-2023-33264.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-33281](CVE-2023/CVE-2023-332xx/CVE-2023-33281.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-33285](CVE-2023/CVE-2023-332xx/CVE-2023-33285.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-33288](CVE-2023/CVE-2023-332xx/CVE-2023-33288.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-33297](CVE-2023/CVE-2023-332xx/CVE-2023-33297.json) (`2023-05-22T10:56:56.373`) -* [CVE-2023-1692](CVE-2023/CVE-2023-16xx/CVE-2023-1692.json) (`2023-05-22T10:57:01.797`) -* [CVE-2023-1693](CVE-2023/CVE-2023-16xx/CVE-2023-1693.json) (`2023-05-22T10:57:01.797`) -* [CVE-2023-1694](CVE-2023/CVE-2023-16xx/CVE-2023-1694.json) (`2023-05-22T10:57:01.797`) -* [CVE-2023-1696](CVE-2023/CVE-2023-16xx/CVE-2023-1696.json) (`2023-05-22T10:57:01.797`) +* [CVE-2023-26118](CVE-2023/CVE-2023-261xx/CVE-2023-26118.json) (`2023-05-22T13:15:09.757`) +* [CVE-2023-23797](CVE-2023/CVE-2023-237xx/CVE-2023-23797.json) (`2023-05-22T13:21:34.157`) +* [CVE-2023-25537](CVE-2023/CVE-2023-255xx/CVE-2023-25537.json) (`2023-05-22T13:21:34.157`) +* [CVE-2023-28709](CVE-2023/CVE-2023-287xx/CVE-2023-28709.json) (`2023-05-22T13:21:34.157`) +* [CVE-2023-2832](CVE-2023/CVE-2023-28xx/CVE-2023-2832.json) (`2023-05-22T13:21:34.157`) +* [CVE-2023-31612](CVE-2023/CVE-2023-316xx/CVE-2023-31612.json) (`2023-05-22T13:25:16.543`) +* [CVE-2023-31613](CVE-2023/CVE-2023-316xx/CVE-2023-31613.json) (`2023-05-22T13:25:35.357`) +* [CVE-2023-31614](CVE-2023/CVE-2023-316xx/CVE-2023-31614.json) (`2023-05-22T13:25:51.347`) +* [CVE-2023-31615](CVE-2023/CVE-2023-316xx/CVE-2023-31615.json) (`2023-05-22T13:26:03.427`) +* [CVE-2023-31616](CVE-2023/CVE-2023-316xx/CVE-2023-31616.json) (`2023-05-22T13:26:18.930`) +* [CVE-2023-31617](CVE-2023/CVE-2023-316xx/CVE-2023-31617.json) (`2023-05-22T13:26:31.713`) +* [CVE-2023-31618](CVE-2023/CVE-2023-316xx/CVE-2023-31618.json) (`2023-05-22T13:26:45.227`) +* [CVE-2023-31619](CVE-2023/CVE-2023-316xx/CVE-2023-31619.json) (`2023-05-22T13:26:59.780`) +* [CVE-2023-31620](CVE-2023/CVE-2023-316xx/CVE-2023-31620.json) (`2023-05-22T13:27:12.930`) +* [CVE-2023-31626](CVE-2023/CVE-2023-316xx/CVE-2023-31626.json) (`2023-05-22T13:29:32.933`) +* [CVE-2023-31627](CVE-2023/CVE-2023-316xx/CVE-2023-31627.json) (`2023-05-22T13:29:51.783`) +* [CVE-2023-31628](CVE-2023/CVE-2023-316xx/CVE-2023-31628.json) (`2023-05-22T13:30:01.657`) +* [CVE-2023-31629](CVE-2023/CVE-2023-316xx/CVE-2023-31629.json) (`2023-05-22T13:30:15.663`) +* [CVE-2023-31630](CVE-2023/CVE-2023-316xx/CVE-2023-31630.json) (`2023-05-22T13:30:38.413`) +* [CVE-2023-31631](CVE-2023/CVE-2023-316xx/CVE-2023-31631.json) (`2023-05-22T13:30:53.093`) +* [CVE-2023-31625](CVE-2023/CVE-2023-316xx/CVE-2023-31625.json) (`2023-05-22T13:31:24.190`) +* [CVE-2023-31624](CVE-2023/CVE-2023-316xx/CVE-2023-31624.json) (`2023-05-22T13:31:35.687`) +* [CVE-2023-31623](CVE-2023/CVE-2023-316xx/CVE-2023-31623.json) (`2023-05-22T13:47:00.637`) +* [CVE-2023-31622](CVE-2023/CVE-2023-316xx/CVE-2023-31622.json) (`2023-05-22T13:47:22.640`) +* [CVE-2023-31621](CVE-2023/CVE-2023-316xx/CVE-2023-31621.json) (`2023-05-22T13:50:12.233`) ## Download and Usage