diff --git a/CVE-2020/CVE-2020-353xx/CVE-2020-35357.json b/CVE-2020/CVE-2020-353xx/CVE-2020-35357.json index 5fbd8269e75..1703234bbef 100644 --- a/CVE-2020/CVE-2020-353xx/CVE-2020-35357.json +++ b/CVE-2020/CVE-2020-353xx/CVE-2020-35357.json @@ -2,12 +2,16 @@ "id": "CVE-2020-35357", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:20.167", - "lastModified": "2023-09-21T20:15:09.787", - "vulnStatus": "Modified", + "lastModified": "2023-10-11T16:12:35.397", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL (GNU Scientific Library), versions 2.5 and 2.6. Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termination or arbitrary code execution." + }, + { + "lang": "es", + "value": "Puede producirse un Desbordamiento del B\u00fafer al calcular el valor del cuantil utilizando Statistics Library of GSL (Biblioteca Cient\u00edfica GNU), versiones 2.5 y 2.6. El procesamiento de datos de entrada creados con fines maliciosos para gsl_stats_quantile_from_sorted_data de la librer\u00eda puede provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { @@ -17,20 +21,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 6.5, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -66,6 +70,21 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] } ], "references": [ @@ -79,7 +98,11 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00023.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://savannah.gnu.org/bugs/?59624", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23370.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23370.json index 72d804b4765..65cf3bef0ff 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23370.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23370.json @@ -2,16 +2,40 @@ "id": "CVE-2023-23370", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2023-10-06T17:15:11.920", - "lastModified": "2023-10-06T19:41:01.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:28:51.223", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An insufficiently protected credentials vulnerability has been reported to affect QVPN Device Client. If exploited, the vulnerability could allow local authenticated administrators to gain access to user accounts and access sensitive data used by the user account via unspecified vectors.\n\nWe have already fixed the vulnerability in the following version:\nQVPN Windows 2.1.0.0518 and later\n" + }, + { + "lang": "es", + "value": "Se ha informado que una vulnerabilidad de credenciales insuficientemente protegidas afecta a QVPN Device Client. Si se explota, la vulnerabilidad podr\u00eda permitir a los administradores locales autenticados obtener acceso a cuentas de usuario y acceder a datos confidenciales utilizados por la cuenta de usuario a trav\u00e9s de vectores no especificados. Ya hemos solucionado la vulnerabilidad en la siguiente versi\u00f3n: QVPN Windows 2.1.0.0518 y posteriores" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "security@qnapsecurity.com.tw", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + }, { "source": "security@qnapsecurity.com.tw", "type": "Secondary", @@ -46,10 +80,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qnap:qvpn:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "2.1.0", + "versionEndExcluding": "2.1.0.0518", + "matchCriteriaId": "ECFD664D-C113-4227-8359-0D9433A03B18" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-23-36", - "source": "security@qnapsecurity.com.tw" + "source": "security@qnapsecurity.com.tw", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23371.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23371.json index a75ac2df570..f4d4ae87e24 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23371.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23371.json @@ -2,16 +2,40 @@ "id": "CVE-2023-23371", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2023-10-06T17:15:11.997", - "lastModified": "2023-10-06T19:41:01.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:32:56.383", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A cleartext transmission of sensitive information vulnerability has been reported to affect QVPN Device Client. If exploited, the vulnerability could allow local authenticated administrators to read sensitive data via unspecified vectors.\n\nWe have already fixed the vulnerability in the following version:\nQVPN Windows 2.2.0.0823 and later\n" + }, + { + "lang": "es", + "value": "Se ha informado que una vulnerabilidad de transmisi\u00f3n de texto plano de informaci\u00f3n confidencial afecta a QVPN Device Client. Si se explota, la vulnerabilidad podr\u00eda permitir a los administradores locales autenticados leer datos confidenciales a trav\u00e9s de vectores no especificados. Ya hemos solucionado la vulnerabilidad en la siguiente versi\u00f3n: QVPN Windows 2.2.0.0823 y posteriores" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "security@qnapsecurity.com.tw", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + }, { "source": "security@qnapsecurity.com.tw", "type": "Secondary", @@ -50,10 +84,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qnap:qvpn:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "2.2.0", + "versionEndExcluding": "2.2.0.0823", + "matchCriteriaId": "4B77347C-39D0-4009-AE9D-4AAE8FD1524B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-23-39", - "source": "security@qnapsecurity.com.tw" + "source": "security@qnapsecurity.com.tw", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24479.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24479.json new file mode 100644 index 00000000000..6fe3a85b216 --- /dev/null +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24479.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-24479", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:12.640", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An authentication bypass vulnerability exists in the httpd nvram.cgi functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1762", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27380.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27380.json new file mode 100644 index 00000000000..7dbc2338d2c --- /dev/null +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27380.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27380", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:12.747", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection vulnerability exists in the admin.cgi USSD_send functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1780", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28381.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28381.json new file mode 100644 index 00000000000..204150567b3 --- /dev/null +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28381.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28381", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:12.827", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection vulnerability exists in the admin.cgi MVPN_trial_init functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1779", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-306xx/CVE-2023-30690.json b/CVE-2023/CVE-2023-306xx/CVE-2023-30690.json index ef68a6358aa..330649b0886 100644 --- a/CVE-2023/CVE-2023-306xx/CVE-2023-30690.json +++ b/CVE-2023/CVE-2023-306xx/CVE-2023-30690.json @@ -2,16 +2,40 @@ "id": "CVE-2023-30690", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-10-04T04:15:12.297", - "lastModified": "2023-10-04T12:56:06.920", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-10-11T17:37:55.533", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper input validation vulnerability in Duo prior to SMR Oct-2023 Release 1 allows local attackers to launch privileged activities." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de validaci\u00f3n de entrada incorrecta en Duo antes de SMR Oct-2023 Release 1 permite a atacantes locales iniciar actividades privilegiadas." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -46,10 +80,395 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "693D72EF-1531-4C15-B105-2DEBE02D30F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*", + "matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "62105EDB-0A60-4153-9F3F-7635CC8756FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BF31CC5-E850-4B7E-BA43-6B1ED560DD45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31272.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31272.json new file mode 100644 index 00000000000..478138e310e --- /dev/null +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31272.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-31272", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:12.913", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A stack-based buffer overflow vulnerability exists in the httpd do_wds functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to stack-based buffer overflow. An attacker can send a network request to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1765", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32632.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32632.json new file mode 100644 index 00000000000..fe10426d2ba --- /dev/null +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32632.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-32632", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:12.997", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A command execution vulnerability exists in the validate.so diag_ping_start functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1767", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32645.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32645.json new file mode 100644 index 00000000000..91330585e6c --- /dev/null +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32645.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-32645", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:13.073", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A leftover debug code vulnerability exists in the httpd debug credentials functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to authentication bypass. An attacker can send a network request to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-489" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32971.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32971.json index 20ae2b99d06..1619933cfef 100644 --- a/CVE-2023/CVE-2023-329xx/CVE-2023-32971.json +++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32971.json @@ -2,16 +2,40 @@ "id": "CVE-2023-32971", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2023-10-06T17:15:12.083", - "lastModified": "2023-10-06T19:41:01.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:38:24.087", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.0.1.2425 build 20230609 and later\nQTS 5.1.0.2444 build 20230629 and later\nQTS 4.5.4.2467 build 20230718 and later\nQuTS hero h5.0.1.2515 build 20230907 and later\nQuTS hero h5.1.0.2424 build 20230609 and later\nQuTS hero h4.5.4.2476 build 20230728 and later\nQuTScloud c5.1.0.2498 and later\n" + }, + { + "lang": "es", + "value": "Se ha informado que una copia del b\u00fafer sin verificar el tama\u00f1o de la vulnerabilidad de entrada afecta a varias versiones del sistema operativo QNAP. Si se explota, la vulnerabilidad podr\u00eda permitir a los administradores autenticados ejecutar c\u00f3digo a trav\u00e9s de una red. Ya hemos solucionado la vulnerabilidad en las siguientes versiones: \nQTS 5.0.1.2425 compilaci\u00f3n 20230609 y posteriores \nQTS 5.1.0.2444 compilaci\u00f3n 20230629 y posteriores \nQTS 4.5.4.2467 compilaci\u00f3n 20230718 y posteriores \nQuTS hero h5.0.1.2515 compilaci\u00f3n 20230907 y posteriores \nQuTS hero h5. 1.0.2424 compilaci\u00f3n 20230609 y posteriores \nQuTS hero h4.5.4.2476 compilaci\u00f3n 20230728 y posteriores \nQuTScloud c5.1.0.2498 y posteriores" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "security@qnapsecurity.com.tw", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "security@qnapsecurity.com.tw", "type": "Secondary", @@ -50,10 +84,74 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5.0", + "versionEndExcluding": "4.5.4.2467", + "matchCriteriaId": "956A4907-29B5-4CB4-BA77-9472E25C2246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.0.1.2425", + "matchCriteriaId": "C6143075-6287-4B3D-A59D-7EA7415C7F07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1.0", + "versionEndExcluding": "5.1.0.2444", + "matchCriteriaId": "834347F5-87D2-479E-81BF-C5F23534E0F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*", + "versionStartIncluding": "h4.5.0", + "versionEndExcluding": "h4.5.4.2476", + "matchCriteriaId": "039CB063-5347-4F85-B6DE-430A94C0B3DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*", + "versionStartIncluding": "h5.0.0", + "versionEndExcluding": "h5.0.1.2515", + "matchCriteriaId": "703732BD-834B-4529-A2E8-AF956F5AD674" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*", + "versionStartIncluding": "h5.1.0", + "versionEndExcluding": "h5.1.0.2424", + "matchCriteriaId": "757BF20E-81DA-447A-B90C-06D096EBACD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qnap:qutscloud:*:*:*:*:*:*:*:*", + "versionStartIncluding": "c5.0.1", + "versionEndExcluding": "c5.1.0.2498", + "matchCriteriaId": "7D3BB6CC-B9D6-4519-92F5-72F74D1A9C28" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-23-37", - "source": "security@qnapsecurity.com.tw" + "source": "security@qnapsecurity.com.tw", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34346.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34346.json new file mode 100644 index 00000000000..527b17692ad --- /dev/null +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34346.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34346", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:13.157", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A stack-based buffer overflow vulnerability exists in the httpd gwcfg.cgi get functionality of Yifan YF325 v1.0_20221108. A specially crafted network packet can lead to command execution. An attacker can send a network request to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-489" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1764", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34354.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34354.json new file mode 100644 index 00000000000..30e6dcb3676 --- /dev/null +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34354.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34354", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:13.233", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A stored cross-site scripting (XSS) vulnerability exists in the upload_brand.cgi functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to execution of arbitrary javascript in another user's browser. An attacker can make an authenticated HTTP request to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1781", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34356.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34356.json new file mode 100644 index 00000000000..835b9ad92b8 --- /dev/null +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34356.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34356", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:13.320", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection vulnerability exists in the data.cgi xfer_dns functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1778", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34365.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34365.json new file mode 100644 index 00000000000..a4875ae8112 --- /dev/null +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34365.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34365", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:13.400", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A stack-based buffer overflow vulnerability exists in the libutils.so nvram_restore functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a buffer overflow. An attacker can send a network request to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1763", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34426.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34426.json new file mode 100644 index 00000000000..9bac3fe4364 --- /dev/null +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34426.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34426", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:13.487", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A stack-based buffer overflow vulnerability exists in the httpd manage_request functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to stack-based buffer overflow. An attacker can send a network request to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1766", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35055.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35055.json new file mode 100644 index 00000000000..97f4634788d --- /dev/null +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35055.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35055", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:13.567", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow vulnerability exists in the httpd next_page functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability.This buffer overflow is in the next_page parameter in the gozila_cgi function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35056.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35056.json new file mode 100644 index 00000000000..8a90d82bf9d --- /dev/null +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35056.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35056", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:13.643", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow vulnerability exists in the httpd next_page functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability.This buffer overflow is in the next_page parameter in the cgi_handler function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35193.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35193.json new file mode 100644 index 00000000000..778e75ea416 --- /dev/null +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35193.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35193", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:13.723", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection vulnerability exists in the api.cgi cmd.mvpn.x509.write functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability is specifically for the `system` call in the file `/web/MANGA/cgi-bin/api.cgi` for firmware version 6.3.5 at offset 0x4bddb8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35194.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35194.json new file mode 100644 index 00000000000..8e498e14068 --- /dev/null +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35194.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35194", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:13.797", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection vulnerability exists in the api.cgi cmd.mvpn.x509.write functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability is specifically for the `system` call in the file `/web/MANGA/cgi-bin/api.cgi` for firmware version 6.3.5 at offset `0x4bde44`." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35897.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35897.json index 159ed99fc14..44a3413c1e8 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35897.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35897.json @@ -2,16 +2,40 @@ "id": "CVE-2023-35897", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-10-06T14:15:11.913", - "lastModified": "2023-10-06T15:25:02.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:21:04.143", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "IBM Spectrum Protect Client and IBM Storage Protect for Virtual Environments 8.1.0.0 through 8.1.19.0 could allow a local user to execute arbitrary code on the system using a specially crafted file, caused by a DLL hijacking flaw. IBM X-Force ID: 259246." + }, + { + "lang": "es", + "value": "IBM Spectrum Protect Client e IBM Storage Protect for Virtual Environments 8.1.0.0 a 8.1.19.0 podr\u00edan permitir a un usuario local ejecutar c\u00f3digo arbitrario en el sistema utilizando un archivo especialmente manipulado, causado por una falla de secuestro de DLL. ID de IBM X-Force: 259246." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -46,14 +80,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:storage_protect:*:*:*:*:virtual_environments\\:_data_protection_for_hyper-v:*:*:*", + "versionStartIncluding": "8.1.0.0", + "versionEndIncluding": "8.1.19.0", + "matchCriteriaId": "67B96354-0D66-477B-B7EA-15FCACF83B3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:storage_protect:*:*:*:*:virtual_environments\\:_data_protection_for_vmware:*:*:*", + "versionStartIncluding": "8.1.0.0", + "versionEndIncluding": "8.1.19.0", + "matchCriteriaId": "8D7B9A95-822F-4766-B098-3183AF0381E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:storage_protect_client:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.1.0.0", + "versionEndIncluding": "8.1.19.0", + "matchCriteriaId": "8CB5C2C0-02C8-4BF6-B52A-EA1A804F68A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/259246", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7037299", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35965.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35965.json new file mode 100644 index 00000000000..b86e182c862 --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35965.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35965", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:13.883", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Two heap-based buffer overflow vulnerabilities exist in the httpd manage_post functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the malloc function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35966.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35966.json new file mode 100644 index 00000000000..fbfc3cf04bb --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35966.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35966", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:13.970", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Two heap-based buffer overflow vulnerabilities exist in the httpd manage_post functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the realloc function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35967.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35967.json new file mode 100644 index 00000000000..7745c611820 --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35967.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35967", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:14.050", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Two heap-based buffer overflow vulnerabilities exist in the gwcfg_cgi_set_manage_post_data functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the malloc function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35968.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35968.json new file mode 100644 index 00000000000..9c74e0dc0ce --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35968.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35968", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2023-10-11T16:15:14.123", + "lastModified": "2023-10-11T16:37:00.913", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Two heap-based buffer overflow vulnerabilities exist in the gwcfg_cgi_set_manage_post_data functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the realloc function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40631.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40631.json index 19ba26bdcb5..baa0ffafbe0 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40631.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40631.json @@ -2,19 +2,160 @@ "id": "CVE-2023-40631", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:55.547", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:30:22.077", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Dialer, there is a possible missing permission check. This could lead to local information disclosure with System execution privileges needed" + }, + { + "lang": "es", + "value": "En Dialer, es posible que falte una verificaci\u00f3n de permisos. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40632.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40632.json index 835a7f60050..a5f2332f41d 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40632.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40632.json @@ -2,19 +2,100 @@ "id": "CVE-2023-40632", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:56.397", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:30:35.847", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In jpg driver, there is a possible use after free due to a logic error. This could lead to remote information disclosure no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En jpg driver, existe un posible use after free debido a un error l\u00f3gico. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n, sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40633.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40633.json index 7e2aca57049..81f1027857e 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40633.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40633.json @@ -2,19 +2,160 @@ "id": "CVE-2023-40633", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:56.483", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:30:45.107", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In phasecheckserver, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En Phasecheckserver, es posible que falte una verificaci\u00f3n de permisos. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40634.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40634.json index 3d9049a5001..f101c2a169d 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40634.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40634.json @@ -2,19 +2,160 @@ "id": "CVE-2023-40634", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:56.553", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:30:56.407", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In phasechecksercer, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En Phasechecksercer, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40635.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40635.json index 52d598e8105..bfc98878176 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40635.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40635.json @@ -2,19 +2,135 @@ "id": "CVE-2023-40635", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:56.630", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:31:07.397", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In linkturbo, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En linkturbo, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40636.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40636.json index 956b8d7c6bc..f974a089f56 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40636.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40636.json @@ -2,19 +2,105 @@ "id": "CVE-2023-40636", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:56.700", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:31:37.140", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In telecom service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with System execution privileges needed" + }, + { + "lang": "es", + "value": "En Telecom service, existe una forma posible de escribir registros de uso de permisos de una aplicaci\u00f3n debido a que falta una verificaci\u00f3n de permisos. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40637.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40637.json index 252f698d477..4b28fda59c5 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40637.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40637.json @@ -2,19 +2,160 @@ "id": "CVE-2023-40637", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:56.773", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:31:43.620", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In telecom service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges" + }, + { + "lang": "es", + "value": "En Telecom service, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40638.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40638.json index 74909ce59ae..da5acedde98 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40638.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40638.json @@ -2,19 +2,105 @@ "id": "CVE-2023-40638", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:56.833", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:31:48.877", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Telecom service, there is a possible missing permission check. This could lead to local denial of service with System execution privileges needed" + }, + { + "lang": "es", + "value": "En Telecom service, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local con privilegios de ejecuci\u00f3n de System necesarios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40639.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40639.json index 9ecbb86fcfc..90a0264e9cb 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40639.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40639.json @@ -2,19 +2,150 @@ "id": "CVE-2023-40639", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:56.897", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:31:54.523", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In SoundRecorder service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges" + }, + { + "lang": "es", + "value": "En el servicio SoundRecorder, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40640.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40640.json index 16b0ad5c473..5488f0c1455 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40640.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40640.json @@ -2,19 +2,150 @@ "id": "CVE-2023-40640", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:56.957", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:32:15.023", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In SoundRecorder service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges" + }, + { + "lang": "es", + "value": "En el servicio SoundRecorder, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40641.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40641.json index 3b8bf644976..3b465040aa8 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40641.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40641.json @@ -2,19 +2,95 @@ "id": "CVE-2023-40641", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:57.027", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:32:34.160", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En Messaging, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40642.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40642.json index c01354a47af..86af73f7001 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40642.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40642.json @@ -2,19 +2,95 @@ "id": "CVE-2023-40642", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:57.087", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:36:05.063", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En Messaging, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40643.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40643.json index 4d22a273917..c0f7ee1770b 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40643.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40643.json @@ -2,19 +2,95 @@ "id": "CVE-2023-40643", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:57.147", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:36:14.043", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En Messaging, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40644.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40644.json index 71e571f26e9..640c1298d37 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40644.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40644.json @@ -2,19 +2,95 @@ "id": "CVE-2023-40644", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:57.207", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:36:21.670", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En Messaging, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40645.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40645.json index 3e0febbe59c..767713c6029 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40645.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40645.json @@ -2,19 +2,95 @@ "id": "CVE-2023-40645", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:57.270", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:36:33.700", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En Messaging, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40646.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40646.json index b384f661f94..303cbdbadf7 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40646.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40646.json @@ -2,19 +2,95 @@ "id": "CVE-2023-40646", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:57.347", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:36:47.633", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En Messaging, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40647.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40647.json index 0a997e13092..b1e0e1bdc7e 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40647.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40647.json @@ -2,19 +2,95 @@ "id": "CVE-2023-40647", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:57.423", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:36:55.953", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En Messaging, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40648.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40648.json index f68a085b379..4dd20140c16 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40648.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40648.json @@ -2,19 +2,95 @@ "id": "CVE-2023-40648", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:57.493", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:35:02.967", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En Messaging, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40649.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40649.json index a669fb8e4e8..2e0d979c126 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40649.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40649.json @@ -2,19 +2,95 @@ "id": "CVE-2023-40649", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:57.563", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:35:11.907", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En Messaging, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40650.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40650.json index fee1c926abb..37ab831805c 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40650.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40650.json @@ -2,19 +2,155 @@ "id": "CVE-2023-40650", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:57.627", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:35:18.570", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Telecom service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En Telecom service, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40651.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40651.json index a3d9c6c00e5..7cfd98751ae 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40651.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40651.json @@ -2,19 +2,160 @@ "id": "CVE-2023-40651", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:57.693", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:35:31.657", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In urild service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed" + }, + { + "lang": "es", + "value": "En urild service, existe una posible escritura fuera de l\u00edmites debido a una comprobaci\u00f3n de l\u00edmites faltantes. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local con privilegios de ejecuci\u00f3n de System necesarios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40652.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40652.json index e53640dd772..f7abf15cf3c 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40652.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40652.json @@ -2,19 +2,100 @@ "id": "CVE-2023-40652", "sourceIdentifier": "security@unisoc.com", "published": "2023-10-08T04:15:57.770", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:35:49.427", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In jpg driver, there is a possible out of bounds write due to improper input validation. This could lead to local denial of service with System execution privileges needed" + }, + { + "lang": "es", + "value": "En jpg driver, existe una posible escritura fuera de l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local con privilegios de ejecuci\u00f3n de System necesarios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-409xx/CVE-2023-40920.json b/CVE-2023/CVE-2023-409xx/CVE-2023-40920.json index 52a6ec917e0..3b660a7b794 100644 --- a/CVE-2023/CVE-2023-409xx/CVE-2023-40920.json +++ b/CVE-2023/CVE-2023-409xx/CVE-2023-40920.json @@ -2,19 +2,82 @@ "id": "CVE-2023-40920", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T20:15:13.013", - "lastModified": "2023-10-05T23:14:04.503", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:26:13.903", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Prixan prixanconnect up to v1.62 was discovered to contain a SQL injection vulnerability via the component CartsGuruCatalogModuleFrontController::importProducts()." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Prixan prixanconnect hasta v1.62 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente CartsGuruCatalogModuleFrontController::importProducts()." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:prixan:prixanconnect:*:*:*:*:*:prestashop:*:*", + "versionEndIncluding": "1.61", + "matchCriteriaId": "7274DE71-49A8-4C9E-AE1F-9F661EDF3759" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://security.friendsofpresta.org/modules/2023/10/05/prixanconnect.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mitigation", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42445.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42445.json index 9edd5656abd..08a2cf5944c 100644 --- a/CVE-2023/CVE-2023-424xx/CVE-2023-42445.json +++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42445.json @@ -2,16 +2,40 @@ "id": "CVE-2023-42445", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-06T14:15:12.103", - "lastModified": "2023-10-06T15:25:02.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:26:44.153", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Gradle is a build tool with a focus on build automation and support for multi-language development. In some cases, when Gradle parses XML files, resolving XML external entities is not disabled. Combined with an Out Of Band XXE attack (OOB-XXE), just parsing XML can lead to exfiltration of local text files to a remote server. Gradle parses XML files for several purposes. Most of the time, Gradle parses XML files it generated or were already present locally. Only Ivy XML descriptors and Maven POM files can be fetched from remote repositories and parsed by Gradle. In Gradle 7.6.3 and 8.4, resolving XML external entities has been disabled for all use cases to protect against this vulnerability. Gradle will now refuse to parse XML files that have XML external entities.\n" + }, + { + "lang": "es", + "value": "Gradle es una herramienta de compilaci\u00f3n centrada en la automatizaci\u00f3n de la build y soporte para el desarrollo en varios idiomas. En algunos casos, cuando Gradle analiza archivos XML, la resoluci\u00f3n de entidades externas XML no est\u00e1 deshabilitada. Combinado con un ataque XXE fuera de banda (OOB-XXE), el simple hecho de analizar XML puede provocar la filtraci\u00f3n de archivos de texto locales a un servidor remoto. Gradle analiza archivos XML para varios prop\u00f3sitos. La mayor\u00eda de las veces, Gradle analiza los archivos XML que gener\u00f3 o que ya estaban presentes localmente. Gradle solo puede recuperar los descriptores XML de Ivy y los archivos POM de Maven de repositorios remotos y analizarlos. En Gradle 7.6.3 y 8.4, la resoluci\u00f3n de entidades externas XML se ha deshabilitado para todos los casos de uso para proteger contra esta vulnerabilidad. Gradle ahora se negar\u00e1 a analizar archivos XML que tengan entidades externas XML." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,18 +70,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gradle:gradle:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.6.3", + "matchCriteriaId": "77803A01-94E7-4C76-BAF3-ED44AE596010" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gradle:gradle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0", + "versionEndExcluding": "8.4", + "matchCriteriaId": "E80A7414-4449-4036-B0F9-99FE64928912" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gradle/gradle/releases/tag/v7.6.3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/gradle/gradle/releases/tag/v8.4.0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/gradle/gradle/security/advisories/GHSA-mrff-q8qj-xvg8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42754.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42754.json index 2149cfd9402..72e3dc2bb98 100644 --- a/CVE-2023/CVE-2023-427xx/CVE-2023-42754.json +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42754.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42754", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-05T19:15:11.413", - "lastModified": "2023-10-10T03:15:09.583", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-10-11T17:42:42.080", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -38,30 +58,139 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6", + "matchCriteriaId": "9D42A7C6-CE38-4D73-B7AC-615F6D53F783" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*", + "matchCriteriaId": "84267A4F-DBC2-444F-B41D-69E15E1BEC97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*", + "matchCriteriaId": "FB440208-241C-4246-9A83-C1715C0DAA6C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-42754", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239845", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://seclists.org/oss-sec/2023/q4/14", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Mailing List", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42755.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42755.json index 328fb2d1534..54f1ab0ac00 100644 --- a/CVE-2023/CVE-2023-427xx/CVE-2023-42755.json +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42755.json @@ -2,16 +2,40 @@ "id": "CVE-2023-42755", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-05T19:15:11.497", - "lastModified": "2023-10-05T23:14:04.503", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:42:18.387", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en el clasificador del IPv4 Resource Reservation Protocol (RSVP) en el kernel de Linux. El puntero xprt puede ir m\u00e1s all\u00e1 de la parte lineal del skb, lo que lleva a una lectura fuera de l\u00edmites en la funci\u00f3n `rsvp_classify`. Este problema puede permitir que un usuario local bloquee el sistema y provoque una denegaci\u00f3n de servicio." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -34,18 +58,77 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.3", + "matchCriteriaId": "3769AA63-B0A8-4EF1-96F9-6A6A6B305A02" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-42755", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239847", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] }, { "url": "https://seclists.org/oss-sec/2023/q3/229", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Mailing List", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-432xx/CVE-2023-43260.json b/CVE-2023/CVE-2023-432xx/CVE-2023-43260.json index ab36f327096..a64a11d18fe 100644 --- a/CVE-2023/CVE-2023-432xx/CVE-2023-43260.json +++ b/CVE-2023/CVE-2023-432xx/CVE-2023-43260.json @@ -2,19 +2,260 @@ "id": "CVE-2023-43260", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T19:15:11.573", - "lastModified": "2023-10-05T23:14:04.503", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:37:27.503", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 was discovered to contain a cross-site scripting (XSS) vulnerability via the admin panel." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Milesight UR5X, UR32L, UR32, UR35, UR41 anteriores a v35.3.0.7 conten\u00edan una vulnerabilidad de Cross-Site Scripting (XSS) a trav\u00e9s del panel de administraci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:milesight:ur51_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "35.3.0.7", + "matchCriteriaId": "A9C278F2-899D-4ACC-AB9F-10806F45E965" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ur51:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A5538BB-43CB-461F-9DA3-11F2F147F233" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:milesight:ur52_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "35.3.0.7", + "matchCriteriaId": "29387539-7C5B-45D8-9888-596DF628A7F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ur52:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22242E4A-9719-4EB1-BB92-2AB606F323A1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:milesight:ur55_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "35.3.0.7", + "matchCriteriaId": "F4924688-6152-4B2F-9784-CA9CE740FF33" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ur55:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFD82DC3-E1E6-4073-8160-03FCADD9151E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:milesight:ur32l_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "35.3.0.7", + "matchCriteriaId": "E538CE7E-1300-40FD-B99F-BDBFF104FB55" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "224B5936-7A7A-48E7-B0F3-754B74E4BF2D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:milesight:ur32_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "35.3.0.7", + "matchCriteriaId": "38B4812C-F6AE-4E05-BF80-41DEE6DB3171" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ur32:-:*:*:*:*:*:*:*", + "matchCriteriaId": "080EADC9-FFA7-4789-8A88-FD3F484EDC42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:milesight:ur35_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "35.3.0.7", + "matchCriteriaId": "8FE72087-C99B-4108-ADA7-1B7FA476E7C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ur35:-:*:*:*:*:*:*:*", + "matchCriteriaId": "616ACA1E-D93D-4A07-AEE0-37C2AE35A326" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:milesight:ur41_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "35.3.0.7", + "matchCriteriaId": "E00FF8AD-4E24-4154-BA7B-99867515AB80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ur41:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D8BC494-6640-47F0-8F58-AB8118C07329" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/win3zz/c7eda501edcf5383df32fabe00938d13", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-432xx/CVE-2023-43261.json b/CVE-2023/CVE-2023-432xx/CVE-2023-43261.json index 4f5deda55a1..29914243698 100644 --- a/CVE-2023/CVE-2023-432xx/CVE-2023-43261.json +++ b/CVE-2023/CVE-2023-432xx/CVE-2023-43261.json @@ -2,35 +2,243 @@ "id": "CVE-2023-43261", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-04T12:15:10.627", - "lastModified": "2023-10-04T12:56:02.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:39:00.060", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 allows attackers to access sensitive router components." + }, + { + "lang": "es", + "value": "Una divulgaci\u00f3n de informaci\u00f3n en Milesight UR5X, UR32L, UR32, UR35, UR41 anterior a v35.3.0.7 permite a los atacantes acceder a componentes confidenciales del router." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:milesight:ur5x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "35.3.0.7", + "matchCriteriaId": "F0915F1C-87D1-4375-9FBC-45C38EBAB645" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ur51:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A5538BB-43CB-461F-9DA3-11F2F147F233" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ur52:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22242E4A-9719-4EB1-BB92-2AB606F323A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ur55:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFD82DC3-E1E6-4073-8160-03FCADD9151E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:milesight:ur32l_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "35.3.0.7", + "matchCriteriaId": "E538CE7E-1300-40FD-B99F-BDBFF104FB55" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "224B5936-7A7A-48E7-B0F3-754B74E4BF2D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:milesight:ur32_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "35.3.0.7", + "matchCriteriaId": "38B4812C-F6AE-4E05-BF80-41DEE6DB3171" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ur32:-:*:*:*:*:*:*:*", + "matchCriteriaId": "080EADC9-FFA7-4789-8A88-FD3F484EDC42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:milesight:ur35_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "35.3.0.7", + "matchCriteriaId": "8FE72087-C99B-4108-ADA7-1B7FA476E7C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ur35:-:*:*:*:*:*:*:*", + "matchCriteriaId": "616ACA1E-D93D-4A07-AEE0-37C2AE35A326" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:milesight:ur41_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "35.3.0.7", + "matchCriteriaId": "E00FF8AD-4E24-4154-BA7B-99867515AB80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ur41:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D8BC494-6640-47F0-8F58-AB8118C07329" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "http://milesight.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://ur5x.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Not Applicable" + ] }, { "url": "https://github.com/win3zz/CVE-2023-43261", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://medium.com/@win3zz/inside-the-router-how-i-accessed-industrial-routers-and-reported-the-flaws-29c34213dfdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://support.milesight-iot.com/support/home", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json index 2a82138963e..713ad9641eb 100644 --- a/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json @@ -2,12 +2,12 @@ "id": "CVE-2023-43641", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-09T22:15:12.707", - "lastModified": "2023-10-11T04:15:11.163", + "lastModified": "2023-10-11T17:15:10.970", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution." + "value": "libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0." }, { "lang": "es", @@ -55,17 +55,17 @@ "url": "https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/", "source": "security-advisories@github.com" }, + { + "url": "https://github.com/lipnitsk/libcue/commit/cfb98a060fd79dbc3463d85f0f29c3c335dfa0ea", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/lipnitsk/libcue/commit/fdf72c8bded8d24cfa0608b8e97f2eed210a920e", + "source": "security-advisories@github.com" + }, { "url": "https://github.com/lipnitsk/libcue/security/advisories/GHSA-5982-x7hv-r9cj", "source": "security-advisories@github.com" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2IYRNAHR55MLFOHVOOIO46GBTGZD4G4W/", - "source": "security-advisories@github.com" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7FPN4SA2GU3D2YOFXF2KDBWTFJX7MOW/", - "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43793.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43793.json index ad57456b8dd..ca676184aed 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43793.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43793.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43793", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-04T21:15:10.040", - "lastModified": "2023-10-10T18:44:48.727", + "lastModified": "2023-10-11T17:47:46.247", "vulnStatus": "Analyzed", "descriptions": [ { @@ -21,19 +21,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 6.5, - "baseSeverity": "MEDIUM" + "baseScore": 7.5, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 3.9, "impactScore": 3.6 }, { diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43805.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43805.json index 4c0065cf73f..feb523567f7 100644 --- a/CVE-2023/CVE-2023-438xx/CVE-2023-43805.json +++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43805.json @@ -2,16 +2,40 @@ "id": "CVE-2023-43805", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-04T21:15:10.203", - "lastModified": "2023-10-05T00:48:59.587", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T16:28:56.947", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Nexkey is a fork of Misskey, an open source, decentralized social media platform. Prior to version 12.121.9, incomplete URL validation can allow users to bypass authentication for access to the job queue dashboard. Version 12.121.9 contains a fix for this issue. As a workaround, it may be possible to avoid this by blocking access using tools such as Cloudflare's WAF." + }, + { + "lang": "es", + "value": "Nexkey es un fork de Misskey, una plataforma de redes sociales descentralizada y de c\u00f3digo abierto. Antes de la versi\u00f3n 12.121.9, la validaci\u00f3n de URL incompleta pod\u00eda permitir a los usuarios omitir la autenticaci\u00f3n para acceder al panel de la cola de trabajos. La versi\u00f3n 12.121.9 contiene una soluci\u00f3n para este problema. Como workaround, es posible evitar esto bloqueando el acceso utilizando herramientas como WAF de Cloudflare." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,18 +70,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nexryai:nexkey:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "12.121.9", + "matchCriteriaId": "68C7C1F9-AD69-45F7-B999-005F4AB9F76D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/misskey-dev/misskey/security/advisories/GHSA-9fj2-gjcf-cqqc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/nexryai/nexkey/commit/d89575c521fd4492f5e2ba5a221c5e8f1382081d", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/nexryai/nexkey/security/advisories/GHSA-g8w5-568f-ffwf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43810.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43810.json index 11e17a5037e..bc5d5193cc7 100644 --- a/CVE-2023/CVE-2023-438xx/CVE-2023-43810.json +++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43810.json @@ -2,16 +2,40 @@ "id": "CVE-2023-43810", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-06T14:15:12.267", - "lastModified": "2023-10-06T15:25:02.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:29:53.507", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "OpenTelemetry, also known as OTel for short, is a vendor-neutral open-source Observability framework for instrumenting, generating, collecting, and exporting telemetry data such as traces, metrics, logs. Autoinstrumentation out of the box adds the label `http_method` that has unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. HTTP method for requests can be easily set by an attacker to be random and long. In order to be affected program has to be instrumented for HTTP handlers and does not filter any unknown HTTP methods on the level of CDN, LB, previous middleware, etc. This issue has been patched in version 0.41b0." + }, + { + "lang": "es", + "value": "OpenTelemetry, tambi\u00e9n conocido como OTel para abreviar, es un framework de observabilidad de c\u00f3digo abierto, independiente del proveedor, para instrumentar, generar, recopilar y exportar datos de telemetr\u00eda, como seguimientos, m\u00e9tricas y registros. La instrumentaci\u00f3n autom\u00e1tica lista para usar agrega la etiqueta `http_method` que tiene cardinalidad ilimitada. Conduce al posible agotamiento de la memoria del servidor cuando se env\u00edan muchas peticiones maliciosas. Un atacante puede configurar f\u00e1cilmente el m\u00e9todo HTTP para solicitudes para que sea aleatorio y largo. Para verse afectado, el programa debe estar instrumentado para controladores HTTP y no filtrar ning\u00fan m\u00e9todo HTTP desconocido en el nivel de CDN, LB, middleware anterior, etc. Este problema se solucion\u00f3 en la versi\u00f3n 0.41b0." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,18 +70,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opentelemetry:opentelemetry:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.41b0", + "matchCriteriaId": "A42C146C-19B1-44AE-94AB-9947D465623B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/open-telemetry/opentelemetry-python-contrib/commit/6007e0c013071e7f8b9612d3bc68aeb9d600d74e", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/open-telemetry/opentelemetry-python-contrib/releases/tag/v0.41b0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/open-telemetry/opentelemetry-python-contrib/security/advisories/GHSA-5rv5-6h4r-h22v", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44231.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44231.json index 8f7a3ab66a2..f0a3c6f3136 100644 --- a/CVE-2023/CVE-2023-442xx/CVE-2023-44231.json +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44231.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44231", "sourceIdentifier": "audit@patchstack.com", "published": "2023-10-09T09:15:10.617", - "lastModified": "2023-10-10T12:16:32.703", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:37:04.393", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nickduncan:contact_form:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.0.10", + "matchCriteriaId": "0AC50FA1-8E39-4028-AA9F-5AA97769A119" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/contact-form-ready/wordpress-contact-form-plugin-2-0-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44232.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44232.json index 620ab9d619c..1449baa29d6 100644 --- a/CVE-2023/CVE-2023-442xx/CVE-2023-44232.json +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44232.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44232", "sourceIdentifier": "audit@patchstack.com", "published": "2023-10-09T09:15:10.713", - "lastModified": "2023-10-10T12:16:32.703", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:34:46.240", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nxsn:wp_hide_pages:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "F5137A2B-307C-4E84-A247-29E84453A7A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-hide-pages/wordpress-wp-hide-pages-plugin-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44236.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44236.json index 7a4e7d5bbf4..90cb5b68403 100644 --- a/CVE-2023/CVE-2023-442xx/CVE-2023-44236.json +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44236.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44236", "sourceIdentifier": "audit@patchstack.com", "published": "2023-10-09T10:15:22.763", - "lastModified": "2023-10-10T12:16:32.703", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-10-11T17:34:32.187", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devnath_verma:wp_captcha:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.0.0", + "matchCriteriaId": "56F36FC0-EB6D-450A-91D0-300508318BE0" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-captcha/wordpress-wp-captcha-plugin-2-0-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44260.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44260.json index d9436309637..d8404503656 100644 --- a/CVE-2023/CVE-2023-442xx/CVE-2023-44260.json +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44260.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44260", "sourceIdentifier": "audit@patchstack.com", "published": "2023-10-09T09:15:10.787", - "lastModified": "2023-10-10T12:16:32.703", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:34:38.623", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rebing:woocommerce_esto:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.23.1", + "matchCriteriaId": "F2FFA0E3-F837-4C53-9974-C0DE0E8819E4" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/woo-esto/wordpress-woocommerce-esto-plugin-2-23-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44384.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44384.json index ed2e127e49e..721d9d43c3d 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44384.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44384.json @@ -2,16 +2,40 @@ "id": "CVE-2023-44384", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-06T18:15:12.247", - "lastModified": "2023-10-06T19:41:01.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:49:49.353", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Discourse-jira is a Discourse plugin allows Jira projects, issue types, fields and field options will be synced automatically. An administrator user can make an SSRF attack by setting the Jira URL to an arbitrary location and enabling the `discourse_jira_verbose_log` site setting. A moderator user could manipulate the request path to the Jira API, allowing them to perform arbitrary GET requests using the Jira API credentials, potentially with elevated permissions, used by the application. " + }, + { + "lang": "es", + "value": "Discourse-jira es un complemento de Discourse que permite que los proyectos, tipos de problemas, campos y opciones de campos de Jira se sincronicen autom\u00e1ticamente. Un usuario administrador puede realizar un ataque SSRF configurando la URL de Jira en una ubicaci\u00f3n arbitraria y habilitando la configuraci\u00f3n del sitio `discourse_jira_verbose_log`. Un usuario moderador podr\u00eda manipular la ruta de solicitud a la API de Jira, permiti\u00e9ndole realizar solicitudes GET arbitrarias utilizando las credenciales de la API de Jira, potencialmente con permisos elevados, utilizadas por la aplicaci\u00f3n." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +60,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,18 +80,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:discourse:discourse_jira:*:*:*:*:*:discourse:*:*", + "versionEndIncluding": "2023-10-01", + "matchCriteriaId": "B59C681F-DB07-4BC1-B845-B7276FC47759" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/discourse/discourse-jira/commit/8a2d3ad228883199fd5f081cc93d173c88e2e48f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/discourse/discourse-jira/pull/50", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/discourse/discourse-jira/security/advisories/GHSA-pmv5-h2x6-35fh", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44386.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44386.json index aa136912375..6eb04ec2ce1 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44386.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44386.json @@ -2,16 +2,40 @@ "id": "CVE-2023-44386", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-05T18:15:12.667", - "lastModified": "2023-10-05T19:13:42.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:47:30.137", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Vapor is an HTTP web framework for Swift. There is a denial of service vulnerability impacting all users of affected versions of Vapor. The HTTP1 error handler closed connections when HTTP parse errors occur instead of passing them on. The issue is fixed as of Vapor release 4.84.2." + }, + { + "lang": "es", + "value": "Vapor es un framework web HTTP para Swift. Existe una vulnerabilidad de denegaci\u00f3n de servicio que afecta a todos los usuarios de las versiones afectadas de Vapor. El controlador de errores HTTP1 cerraba las conexiones cuando se produc\u00edan errores de an\u00e1lisis HTTP en lugar de transmitirlos. El problema se solucion\u00f3 a partir de la versi\u00f3n 4.84.2 de Vapor." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -54,18 +78,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vapor:vapor:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.83.2", + "versionEndExcluding": "4.84.2", + "matchCriteriaId": "E52303C2-AF9E-4F61-86C3-EDD76AD0BB43" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vapor/vapor/commit/090464a654b03148b139a81f8f5ac63b0856f6f3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/vapor/vapor/releases/tag/4.84.2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/vapor/vapor/security/advisories/GHSA-3mwq-h3g6-ffhm", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44387.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44387.json index 33e6b04791f..9820bcae2a9 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44387.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44387.json @@ -2,16 +2,40 @@ "id": "CVE-2023-44387", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-05T18:15:12.787", - "lastModified": "2023-10-05T19:13:42.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:46:10.753", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Gradle is a build tool with a focus on build automation and support for multi-language development. When copying or archiving symlinked files, Gradle resolves them but applies the permissions of the symlink itself instead of the permissions of the linked file to the resulting file. This leads to files having too much permissions given that symlinks usually are world readable and writeable. While it is unlikely this results in a direct vulnerability for the impacted build, it may open up attack vectors depending on where build artifacts end up being copied to or un-archived. In versions 7.6.3, 8.4 and above, Gradle will now properly use the permissions of the file pointed at by the symlink to set permissions of the copied or archived file." + }, + { + "lang": "es", + "value": "Gradle es una herramienta de compilaci\u00f3n centrada en la automatizaci\u00f3n de la compilaci\u00f3n y soporte para el desarrollo en varios idiomas. Al copiar o archivar archivos vinculados simb\u00f3licamente, Gradle los resuelve pero aplica los permisos del enlace simb\u00f3lico en lugar de los permisos del archivo vinculado al archivo resultante. Esto lleva a que los archivos tengan demasiados permisos, dado que los enlaces simb\u00f3licos suelen ser legibles y escribibles por todo el mundo. Si bien es poco probable que esto resulte en una vulnerabilidad directa para la compilaci\u00f3n afectada, puede abrir vectores de ataque dependiendo de d\u00f3nde terminen copi\u00e1ndose o desarchiv\u00e1ndose los artefactos de la compilaci\u00f3n. En las versiones 7.6.3, 8.4 y superiores, Gradle ahora usar\u00e1 correctamente los permisos del archivo al que apunta el enlace simb\u00f3lico para establecer los permisos del archivo copiado o archivado." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,22 +70,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gradle:gradle:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.6.3", + "matchCriteriaId": "77803A01-94E7-4C76-BAF3-ED44AE596010" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gradle:gradle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.4.0", + "matchCriteriaId": "E104EF19-8B72-4A31-B2AC-8312F7C6452F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gradle/gradle/commit/3b406191e24d69e7e42dc3f3b5cc50625aa930b7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/gradle/gradle/releases/tag/v7.6.3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/gradle/gradle/releases/tag/v8.4.0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/gradle/gradle/security/advisories/GHSA-43r3-pqhv-f7h9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-447xx/CVE-2023-44758.json b/CVE-2023/CVE-2023-447xx/CVE-2023-44758.json index ffe54810506..ca3f62e8ec7 100644 --- a/CVE-2023/CVE-2023-447xx/CVE-2023-44758.json +++ b/CVE-2023/CVE-2023-447xx/CVE-2023-44758.json @@ -2,19 +2,79 @@ "id": "CVE-2023-44758", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-06T11:15:11.260", - "lastModified": "2023-10-06T12:48:29.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:19:53.303", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "GDidees CMS 3.0 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Page Title." + }, + { + "lang": "es", + "value": "GDidees CMS 3.0 se ve afectado por una vulnerabilidad de Cross-Site Scripting (XSS) que permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el t\u00edtulo de la p\u00e1gina." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gdidees:gdidees_cms:3.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7AA055D4-014E-400B-B6CF-F686ED1E2BC9" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/sromanhu/GDidees-CMS-Stored-XSS---Title/tree/main", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44860.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44860.json index 982c57f3150..56325107e21 100644 --- a/CVE-2023/CVE-2023-448xx/CVE-2023-44860.json +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44860.json @@ -2,19 +2,91 @@ "id": "CVE-2023-44860", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-06T23:15:11.120", - "lastModified": "2023-10-08T17:50:12.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:54:51.067", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in NETIS SYSTEMS N3Mv2 v.1.0.1.865 allows a remote attacker to cause a denial of service via the authorization component in the HTTP request." + }, + { + "lang": "es", + "value": "Un problema en NETIS SYSTEMS N3Mv2 v.1.0.1.865 permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s del componente de autorizaci\u00f3n en la solicitud HTTP." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netis-systems:n3m_firmware:1.0.1.865:*:*:*:*:*:*:*", + "matchCriteriaId": "C183597B-AF8E-4019-BA83-D47FC1AA71E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netis-systems:n3m:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FF3A2D7D-91F7-474B-94E3-4D1E4702ADA5" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/adhikara13/CVE/blob/main/netis_N3/Improper%20Authentication%20Mechanism%20Leading%20to%20Denial-of-Service%20(DoS).md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4469.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4469.json index 093ddd1e97b..c4ea0f7c3b0 100644 --- a/CVE-2023/CVE-2023-44xx/CVE-2023-4469.json +++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4469.json @@ -2,12 +2,16 @@ "id": "CVE-2023-4469", "sourceIdentifier": "security@wordfence.com", "published": "2023-10-06T10:15:18.527", - "lastModified": "2023-10-06T12:48:29.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:19:06.607", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Profile Extra Fields by BestWebSoft plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the prflxtrflds_export_file function in versions up to, and including, 1.2.7. This makes it possible for unauthenticated attackers to expose potentially sensitive user data, including data entered into custom fields." + }, + { + "lang": "es", + "value": "El complemento Profile Extra Fields de BestWebSoft para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n prflxtrflds_export_file en versiones hasta la 1.2.7 incluida. Esto hace posible que atacantes no autenticados expongan datos de usuario potencialmente confidenciales, incluidos los datos ingresados en campos personalizados." } ], "metrics": { @@ -46,14 +50,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bestwebsoft:profile_extra_fields:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.7", + "matchCriteriaId": "F67B9BFC-509E-4CB4-AAB0-9343B1EDA232" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/2975179/profile-extra-fields", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/916c73e8-a150-4b35-8773-ea0ec29f7fd1?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45159.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45159.json index e82dcf23fd0..5126426f339 100644 --- a/CVE-2023/CVE-2023-451xx/CVE-2023-45159.json +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45159.json @@ -2,16 +2,40 @@ "id": "CVE-2023-45159", "sourceIdentifier": "security@1e.com", "published": "2023-10-05T11:15:14.063", - "lastModified": "2023-10-05T12:53:40.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:18:28.327", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "1E Client installer can perform arbitrary file deletion on protected files.\u00a0\u00a0\n\nA non-privileged user could provide a symbolic link or Windows junction to point to a protected directory in the installer that the 1E Client would then clear on service startup. A hotfix is available Q23092 that forces\u00a0the 1E Client to check for a symbolic link or junction and if it finds one refuses to use that path and instead creates a path involving a random GUID.\n\n" + }, + { + "lang": "es", + "value": "El instalador de 1E Client puede realizar la eliminaci\u00f3n arbitraria de archivos protegidos. Un usuario sin privilegios podr\u00eda proporcionar un enlace simb\u00f3lico o una uni\u00f3n de Windows para apuntar a un directorio protegido en el instalador que el Cliente 1E borrar\u00eda al iniciar el servicio. Hay una revisi\u00f3n disponible Q23092 que obliga al cliente 1E a buscar un enlace o cruce simb\u00f3lico y, si encuentra uno, se niega a usar esa ruta y en su lugar crea una ruta que involucra un GUID aleatorio." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + }, { "source": "security@1e.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + }, { "source": "security@1e.com", "type": "Secondary", @@ -46,10 +80,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1e:client:8.1.2.62:*:*:*:*:windows:*:*", + "matchCriteriaId": "EF79F84B-2408-44F9-A7AD-D9CAB9C34A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1e:client:8.4.1.159:*:*:*:*:windows:*:*", + "matchCriteriaId": "4A156058-6634-4C59-831B-9A6E7C95BE84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1e:client:9.0.1.88:*:*:*:*:windows:*:*", + "matchCriteriaId": "66EA1F19-4432-4D9F-82DD-91062B54284B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1e:client:23.7.1.151:*:*:*:*:windows:*:*", + "matchCriteriaId": "73A8F998-B3AF-46C6-B4E5-3FEF6EA25A99" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.1e.com/trust-security-compliance/cve-info/", - "source": "security@1e.com" + "source": "security@1e.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45198.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45198.json index b4c71cada81..45147c0290a 100644 --- a/CVE-2023/CVE-2023-451xx/CVE-2023-45198.json +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45198.json @@ -2,23 +2,93 @@ "id": "CVE-2023-45198", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T05:15:42.257", - "lastModified": "2023-10-05T12:53:40.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:15:31.923", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "ftpd before \"NetBSD-ftpd 20230930\" can leak information about the host filesystem before authentication via an MLSD or MLST command. tnftpd (the portable version of NetBSD ftpd) before 20231001 is also vulnerable." + }, + { + "lang": "es", + "value": "ftpd antes de \"NetBSD-ftpd 20230930\" puede filtrar informaci\u00f3n sobre el sistema de archivos del host antes de la autenticaci\u00f3n mediante un comando MLSD o MLST. tnftpd (la versi\u00f3n port\u00e1til de NetBSD ftpd) anterior a 20231001 tambi\u00e9n es vulnerable." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbsd:ftpd:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023-09-30", + "matchCriteriaId": "D23DFEC0-011A-4066-8D10-CF671F9A01D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbsd:tnftpd:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023-10-01", + "matchCriteriaId": "C2404151-669D-403F-951D-7F4795BA2033" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/libexec/ftpd/ftpcmd.y.diff?r1=1.94&r2=1.95", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://mail-index.netbsd.org/source-changes/2023/09/22/msg147669.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45246.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45246.json index 6ceec29fc02..9581a054812 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45246.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45246.json @@ -2,15 +2,41 @@ "id": "CVE-2023-45246", "sourceIdentifier": "security@acronis.com", "published": "2023-10-06T11:15:11.447", - "lastModified": "2023-10-06T12:48:29.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:20:21.937", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 36343." + }, + { + "lang": "es", + "value": "Divulgaci\u00f3n y manipulaci\u00f3n de informaci\u00f3n sensible por autenticaci\u00f3n inadecuada. Los siguientes productos se ven afectados: Acronis Agent (Linux, macOS, Windows) antes de la compilaci\u00f3n 36343." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "security@acronis.com", @@ -35,6 +61,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, { "source": "security@acronis.com", "type": "Secondary", @@ -46,10 +82,53 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*", + "versionEndIncluding": "c23.08", + "matchCriteriaId": "C5CBB48A-D5E0-489C-BA7D-4D5DA86834AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://security-advisory.acronis.com/advisories/SEC-5903", - "source": "security@acronis.com" + "source": "security@acronis.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4530.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4530.json index fb4ef327260..5221d068331 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4530.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4530.json @@ -2,12 +2,16 @@ "id": "CVE-2023-4530", "sourceIdentifier": "cve@usom.gov.tr", "published": "2023-10-06T10:15:18.630", - "lastModified": "2023-10-06T12:48:29.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:19:19.627", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Turna Advertising Administration Panel allows SQL Injection.This issue affects Advertising Administration Panel: before 1.1.\n\n" + }, + { + "lang": "es", + "value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL (\"SQL Injection\") en el Panel de administraci\u00f3n de Turna Advertising permite la inyecci\u00f3n de SQL. Este problema afecta al Panel de administraci\u00f3n de publicidad: versiones anteriores a 1.1." } ], "metrics": { @@ -46,10 +50,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:turnatasarim:advertising_administration_panel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1", + "matchCriteriaId": "50B678EC-1E67-434E-8272-17A26D9481D3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-23-0571", - "source": "cve@usom.gov.tr" + "source": "cve@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4936.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4936.json new file mode 100644 index 00000000000..bce99644755 --- /dev/null +++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4936.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-4936", + "sourceIdentifier": "PSIRT@synaptics.com", + "published": "2023-10-11T17:15:11.117", + "lastModified": "2023-10-11T17:15:11.117", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "It is possible to sideload a compromised DLL during the installation at elevated privilege." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "PSIRT@synaptics.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@synaptics.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://www.synaptics.com/", + "source": "PSIRT@synaptics.com" + }, + { + "url": "https://www.synaptics.com/products/displaylink-graphics/downloads/windows", + "source": "PSIRT@synaptics.com" + }, + { + "url": "https://www.synaptics.com/sites/default/files/nr-154525-tc-synaptics_displaylink_windows_driver_security_brief_-_oct2023.pdf", + "source": "PSIRT@synaptics.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5113.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5113.json index ff009ca87c8..e812e10bb7b 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5113.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5113.json @@ -2,19 +2,5746 @@ "id": "CVE-2023-5113", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-10-04T15:15:12.760", - "lastModified": "2023-10-04T15:53:23.283", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:41:34.833", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to denial of service due to WS-Print request and potential injections of Cross Site Scripting via jQuery-UI." + }, + { + "lang": "es", + "value": "Certain HP Enterprise LaserJet and HP LaserJet Managed Printers son potencialmente vulnerables a la denegaci\u00f3n de servicio debido a la solicitud de WS-Print y posibles inyecciones de Cross Site Scripting (XSS) a trav\u00e9s de jQuery-UI." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:futuresmart_5:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.7", + "matchCriteriaId": "624CE725-2162-46BD-941B-098257EA5C70" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_5700_49k98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5F1D000-7FA7-4AED-8B98-9100433E6124" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_5700_6qn28a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2F250C4-0ABE-42F3-B3A5-E36B1592D4A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_6700_49l00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E58DD910-74E0-4D1C-B340-F3FA3573DF06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_6700_4y280a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B589183-2CAB-4D00-9CB8-B06F5FA10D2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_6700_58m42a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "67A8FAAD-A546-4C2B-85A2-1821FFC79C63" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_6700_6qn33a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4AB68130-5956-45F7-A37B-E6B9B5D9C7B6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_6701_49l00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0069B808-74F3-4BAD-867B-21126B05DBCD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_6701_4y280a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65D13B96-8159-4FAC-9813-9EE749CEA6CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_6701_58m42a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD587734-0CDF-4209-8B3E-70DA45C2BB76" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_6701_6qn33a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91D7A277-7D5B-4895-9086-BFF88842EDD2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_5800_58r10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A6B535F-1E90-4D80-B225-E5ED7D7B7D76" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_5800_6qn29a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7EC1804-CD2F-486A-89CA-125100EF2A6A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_5800_6qn30a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CFB17FC-3808-40D9-9DAF-F7EFBD4C1049" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_5800_6qn31a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "586D6A2F-D0FC-4427-B2F9-47C4FFF6AA9B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_49k84a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DEB7DA52-A265-4C1B-B935-55A1A72386F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_4y279a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1DF830DF-B535-4C8F-90C8-C843C57FFD39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_6qn35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E4EAD3A-E328-45F8-A312-E15DC68840DD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_6qn36a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28483D68-16A9-4330-BF7F-9CCF76E34879" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_6qn37a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C1411DF0-4240-47DD-B274-E700526CCDCE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_6800_6qn38a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AB7873D-0952-4F0B-B047-79E2E571BB44" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_m577_b5l46a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4ADD719-B85E-4C2B-AE15-9D82D0DF0A5F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_m577_b5l47a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D69A8C7-5DB4-4828-B433-A5FCDC97B7F9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_m577_b5l48a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9411F762-B06F-441E-ACA7-B86130ECD83B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_m577_b5l54a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79784B8F-DDDC-4E60-B633-5038433D1EB7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_m578_7zu85a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "24D35D12-C819-432F-AD68-5404CE0660FA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_m578_7zu86a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44C011CF-A3E1-4ACB-B11D-7E5D4B8C67F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_m578_7zu87a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E40C601-E525-4EB5-8522-33D57BB865A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_m578_7zu88a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F861944-EDDE-40BF-9D2C-E9E82489A335" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_m681_j8a10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FBAACEC-CA4D-4094-A828-A2B473523902" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_m681_j8a11a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4F771F1-C15F-481F-87BE-CCC1434BD93E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_m681_j8a12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08B406A0-D9A4-4FF4-9771-2600308DE738" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_m681_j8a13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15D08D61-AF52-4D94-B781-39E7057AA15A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_m682_j8a16a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "394809EE-F63A-49AD-AFA8-5D4F069A0EA5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_m682_j8a17a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E53376AD-882E-4ABA-9D1C-559F6AE3931A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_m776_t3u55a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61A6A2F9-E1C5-4D8A-9D44-C72AA47A622B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_m776_t3u56a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6D68E64-DE83-4D3D-92CA-25E28E9AAD65" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_x57945_49k97av:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FAFE11C-7473-4997-A66F-A9AD1D7788B4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_x57945_6qp98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16A63D03-3576-4F03-A554-081E40842B11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_flow_mfp_x57945_6qp99a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B33FE0A-4881-40A2-8E98-BA9952052868" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m455_3pz95a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF067B6A-699B-42F7-AA3F-62BA2B0DF662" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m553_b5l24a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42EE55A2-5E75-4AE3-9007-5116B200FAB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m553_b5l25a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C52ACA21-9690-4A97-86DC-944457D61F23" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m553_b5l26a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62F99675-3B39-4216-834C-9FC067E39CE1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m553_b5l38a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99F463B3-4A9D-4572-94D4-ACD30C05E5DA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m553_b5l39a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CB09D63-8935-40AB-A81C-6117C889C952" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m553_bl27a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "383A415C-4FA6-4830-AF5F-FA5932C5B130" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m554_7zu78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20CB1E0F-121D-41CC-BD7D-9A4EF2AB2CB5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m554_7zu79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FAEA526A-BB6D-43A8-A6CF-BF7F4D2D0A23" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m554_7zu81a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A96221E-3B25-41FD-91AB-D925D573660A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m555_7zu78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B43978B-57FC-4B5E-ADE8-D08ECCF4B451" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m555_7zu79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7183D673-0B8F-4DBC-998F-FB9CAB02CE67" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m555_7zu81a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB3D2897-F36D-4FC4-A602-9E93D6D42C88" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m652_j7z98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "957A78D3-E50D-4FDF-A95E-04F8F9753ABE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m652_j7z99a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A08A37DE-B0FF-4D52-9D45-5D1C70B91002" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m653_j8a04a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2960F83-859B-4572-B6ED-7F7D3B47EE1E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m653_j8a05a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A7AAEDE-E30E-4132-A5C3-D0F61606DBC4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m653_j8a06a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4CA0673-F11F-40E6-8C23-CCE9370986E7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m751_t3u43a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E8613D3-C62B-4974-B957-330A81761CBB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m751_t3u44a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87B1D9EF-D541-471B-8500-693A6FE44317" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m856_t3u51a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B3F5A41-A27F-4617-B439-1EB37C84FE7A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_m856_t3u52a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B37184C1-B9BF-4F80-A7CD-17A9BEABF063" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_5800_49k96av:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2DD01D8B-1C8A-4893-AF46-16352E7D562F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_5800_58r10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1125373-7775-41AD-99CD-F003F12B7742" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_5800_6qn29a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED1F5E61-5423-4269-9CD5-1EB6B383D09E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_5800_6qn30a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6D32ADC-6BD2-4407-9720-62EA7317D594" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_5800_6qn31a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E5C16FCD-8F13-4777-989F-6CF467127178" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_49k84a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93C3EB01-5C79-42F9-B51D-460AE8F6B99F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_4y279a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C8478D7-1647-408B-B627-BB00FF58FB7D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_6qn35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34503A49-195E-4EAB-A3F0-7BE269C5AB87" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_6qn36a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A5067AD-A1E6-453D-B3E3-35594BBF44FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_6qn37a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C9222DD-630A-423B-9660-46CCF781DB83" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_6800_6qn38a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D91AD36C-C231-4305-87E4-FDB0C6D25AD3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m480_3qa55a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5026FDA2-CFED-4E3C-B7DC-01073A7BBA18" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m577_b5l46a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6635E72C-AE62-4CA5-9FEE-79E2C40A6B9E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m577_b5l47a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "605A9C09-526A-419B-A9B9-29D1EE581A95" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m577_b5l48a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C71D869-1A51-400F-95A9-3CCCC87BB03F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m577_b5l54a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1289BFF-9539-46A8-A5C3-2AFE8D59D92E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m578_7zu85a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F73DEB46-BA91-4D0D-9843-0FB34A10C659" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m578_7zu86a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBF07C70-92F9-4E7D-8F9C-5B3CDCFF47B9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m578_7zu87a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39645E78-BC60-4D8F-A322-D90BDDCC5FBD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m578_7zu88a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACAF43DB-1B68-4883-B4F9-E6A48D0991C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m681_j8a10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3627D36C-2C9E-48EA-8DDE-99C22A12EEBC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m681_j8a11a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69D774FF-CC70-4AF8-9256-1ECC0B817E54" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m681_j8a12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C267E7E0-926A-40B5-93F3-F21DE21716E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m681_j8a13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B6F8F24-5AEC-45D2-9397-78E1C241EB51" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m682_j8a16a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C73CC6E-6C94-4656-9DA0-D246F58B1F65" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m682_j8a17a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19E1CBB1-84EA-469E-B4BB-817EE584A4C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m776_t3u55a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD2B7117-886F-4CBD-962E-326ABB01A724" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_m776_t3u56a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB76B106-276A-4682-8F2C-7784EC5F823B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_x57945_49k97av:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F7834CF-DE98-485B-884B-E6AE2D4A327B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_x57945_6qp98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8CB68AA-5EE8-4314-888A-C41EA582B5BF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_mfp_x57945_6qp99a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20843770-ECC5-48E4-B9FE-FAFF3D3C8F4A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_x55745_49k99a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59F541C1-88A2-4E67-80D2-D7C371459C8B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_enterprise_x55745_6qp97a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "126F01B1-E9E1-4765-BDC8-B77BE7E6325F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_e45028_3qa35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26A8A5AD-2534-49EB-A1BD-6B0323A446D9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_e55040dw_3gx98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B636D57-68D5-4CAE-A0CF-910FC5EA5BA9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_e65050_l3u55a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1424F62C-0054-45CE-942A-CAC961E9554D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_e65050_l3u56a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "221538F9-9492-46CC-9B39-0D3F0E64807E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_e65050_l3u57a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D2F38BF7-5C37-4D45-A2BD-ACC7D132DAD4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_e65060_l3u55a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0465F3DF-6154-4088-8121-CB59CD9CD25D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_e65060_l3u56a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3BCAB221-FF1B-4150-A8A9-2AB5C80C7C40" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_e65060_l3u57a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "330A4D8D-5BF2-474E-9358-32311E192FBC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_e65150_3gy03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D69E64C-0196-4DA9-B07D-78C82EF06D2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_e65150_3gy04a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BDF0821-8A58-4D19-B70C-6CF819FF955B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_e65160_3gy03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F39A1A32-178A-4FE6-954B-D7A59AEE9DCC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_e65160_3gy04a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02345B19-53E6-44E2-8056-07D0B29C2E8D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_e75245_t3u64a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1291BAEB-8365-49ED-A14F-983AB1D86980" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_e85055_t3u66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5EB72CB-7808-4B1C-943E-DEA2089C08A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj19a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "572FE090-338F-4DE5-B85C-F501C3B5F0A9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C84E2A61-8414-45D0-8EA1-46B482E76EE4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj21a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6416038-CC62-4714-9B3E-BCE7C54D195C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB78B38-405A-4DC2-ADEF-4A731DEAF7BB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6494B8B-B894-4B63-8A51-3D6F8BC0B6AF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj36a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1953A60A-C722-4751-960A-DDFFEBB04FE6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj37a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD592079-7B07-4496-9F87-1B1B8B97A71A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_3sj38a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80034B15-9608-4912-B771-20DFE4F02127" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_5qk03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "200F43E0-495C-499D-AFDD-9ABC1C678A54" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_5qk08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17277041-0A8E-4A58-A0BE-B1098DECEFBC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87740_5qk20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C558FE0-F334-44BE-A396-E3EDBCF270F3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj19a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36076955-3744-49FB-A427-592E379D7B0C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17D6402F-D99B-4E8B-BB28-35FD781F4733" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj21a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C174F9E-5A02-4896-83B6-54820D4B4057" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F44A177-84B7-4966-A576-C435B6AAEAD9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "778A11F6-9B63-4DF2-A702-CEB9F1295510" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj36a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0036B79-F071-4A02-8BAC-B7918E28B643" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj37a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9320671-4E06-4161-8CCE-4AAA94E17F46" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_3sj38a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "662B7D63-C11F-4A5D-932E-6DA8B180C8C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_5qk03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "398DC78F-6BA6-49FF-BB51-BAFB22268889" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_5qk08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6465F0F3-B560-4346-9339-CA85271B306B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87750_5qk20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "963590BE-F861-4DDD-8DAC-0054C33B0EE5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj19a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84C4217D-AC8E-45EA-BB0E-1C1806DCAA12" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84589C21-FE64-4C28-9527-D5FF90762738" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj21a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45335DBB-4E7D-4F6E-9FFA-BEC023A6F20D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7636626-8FAB-4F4F-B43E-639B1C53AE81" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B551DDF0-FD33-445B-BC3B-F416A3943B5B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj36a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "956C3663-1D67-4AD6-AE30-ECC8A2808E04" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj37a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B46D8B6-97D7-4094-BDEA-82CDB51CC07D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_3sj38a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B755E58D-0A53-46EC-BC80-6626C9885BD0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_5qk03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4EDAF39-C71B-4F1A-A850-3BCCA5476395" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_5qk08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6343F36-BAE2-4E1A-B93D-F847DCBF8E22" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87760_5qk20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B232EF-4AE0-422D-BE33-2422E6C6627F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj19a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2ABADF99-ECBE-4922-A80A-A3D39B9AB632" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB081B54-5910-4E39-AC31-240B170A669F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj21a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DB07870-AB75-457C-B71A-DDFF862C9E71" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD1348C3-8D3D-4AF4-9567-43C54AEF4FD5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "607E677B-47E1-4A27-88B7-4B54E777A033" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj36a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18F6A6B0-37C0-46F9-9305-7712583ACF8E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj37a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3411C9BF-99B2-420B-A1B7-F9BD25E16F19" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_3sj38a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A09AB52F-4AA0-4EC8-B135-8F258345E013" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_5qk03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE001CBE-BDAA-4EFF-8965-5DA97718CDEF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_5qk08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06699038-3163-48D8-A150-96E54D16904D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_e87770_5qk20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D7E82A2F-DE3D-485F-8654-49982871A8F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e57540_3gy25a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E90E0D08-6834-4863-A793-500266733FE4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e57540_3gy26a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD5AE368-0C49-400D-B32C-0AA1415A4C55" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e67550_l3u66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "242B5443-CBE5-4B01-9594-C31F742290A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e67550_l3u67a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11666CBE-EEF5-4EF7-8F3F-2267940CDBDB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e67550_l3u69a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A807CC2E-1C84-4D8B-A772-F196799443C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e67550_l3u70a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E26B579-20AA-4E48-88E8-B07FE48723DF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e67560_l3u66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A2AB0A7-4B3A-430C-8C09-563FE5859E61" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e67560_l3u67a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C42CCEA3-9219-47FF-A3B0-EED28B648B6C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e67560_l3u69a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AE69A73-07B7-4701-B4C7-698044AC9635" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e67560_l3u70a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6E67D5B-D655-49F1-B54B-E6E14BFD5AE1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77822_x3a77a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AD973BF-A97B-4F47-AFDC-752D3655DFB8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77822_x3a78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D74308D-6123-4A5C-8BE0-987778E8A06F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77822_x3a80a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BCDE6AFD-F118-4DD0-A49E-0BE474E60781" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77822_x3a81a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A9A35E4-E01D-4656-95C6-2E0FA77FDF5A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77822_x3a83a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93EDB340-31E5-4E64-8D36-F2C39321EE13" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77822_x3a84a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "720B8845-2306-48DF-9203-314C197ED732" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77822_z8z00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FAB7E11B-D774-4604-A7FA-BCA4FAC75C87" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77822_z8z01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC4D0514-B6B7-44CC-9364-24319D0D1B2C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77822_z8z02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2519611A-3199-46AA-BA9E-A40CB157B9CC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77822_z8z04a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "223CF624-4D06-4959-AACC-ED4BB36EA450" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77822_z8z05a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "649210F2-3C2B-4BDB-B873-C56B2B857B59" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77822_z8z0a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D97C2F6-6993-484D-A146-FF9C6942B87B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77825_x3a77a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFFC2127-C653-4F2F-9286-B88A6AFBD532" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77825_x3a78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FB80759-81C5-4719-B528-2FDE09C312A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77825_x3a80a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "516227C4-6C29-44C5-843D-FC62C206D7F2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77825_x3a81a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81391FFC-4BAE-49E0-B845-0D678B3BD67F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77825_x3a83a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8422A947-51ED-45C7-80D8-98548C865A64" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77825_x3a84a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93826931-A448-453C-AD0B-2ECE165172CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77825_z8z00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B45BB351-B88C-4818-BE54-B14B4725CA2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77825_z8z01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E06C82A9-4532-4CEE-9C30-D694B5DB4FCA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77825_z8z02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B617E4FE-8849-42FE-8660-377E920ED6BB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77825_z8z04a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E08F66B-F613-4D02-A8F4-6DCAF70940A7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77825_z8z05a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3DC993F4-83F4-429E-8F41-EA9CCA111B51" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77825_z8z0a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26C0099B-E7EA-4DBB-BB9F-9AF2576F9D90" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77830_x3a77a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BBDBE303-B47E-4FFD-8C0D-A7B2EABB8588" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77830_x3a78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36C316B9-3E68-430B-A814-AFCCB4B88A9E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77830_x3a80a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "844EF661-101B-487F-940B-F34F9E3CA6A9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77830_x3a81a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "168C00E8-B2C3-47D7-A8EF-78E44D52D9E1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77830_x3a83a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAE28DF6-2347-4141-AF84-44CCAF5D48F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77830_x3a84a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16A7492F-E29B-4891-B232-956F631CBB53" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77830_z8z00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D302233-4CC4-4406-9561-AEE52E562B98" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77830_z8z01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07F4C471-B26E-4F90-9AEE-C166504470C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77830_z8z02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8795F701-EF72-4C41-BFF9-CF5CEF6400F7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77830_z8z04a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BBB337B5-3F69-441F-93DE-C68E9054BD3E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77830_z8z05a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AFE5EA0-6CF0-4C82-99DA-FDCC803C9484" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e77830_z8z0a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "768ECC0D-4862-4DCF-BC17-D3E621925422" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj11a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFADC907-BE39-4585-8A21-0C2FC531227A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABE0ACCA-A6B0-4506-8A4E-6938A8CBD777" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D041B95-4D85-48B7-9555-3DA00B008DD3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj32a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC5C711F-8DD8-43D5-9F6F-47A0F4C4160E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj33a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51ED3439-3040-4ECD-A133-22665207E1CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_3sj34a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE381FCE-6558-496F-9D0D-5801300551ED" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_5qj90a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F2CEA2B-3129-46BA-9B85-C78A51715E99" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_5qj94a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13A53469-6B93-4DBF-A10F-06BBF5470B1D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e786_5qk18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82AF3A35-0375-4ECA-8710-B80CF232F5B4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj11a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "818D7EF5-C54A-4F68-A800-86D4EAD08B31" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02A70E52-F21A-4AE3-B734-C9EA9FD4AD35" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23AE16CA-0B13-4D66-885F-06AC6C024750" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj32a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4303A92E-BAA5-47EB-A6CE-03DA9C7052C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj33a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E81C8DB-40A7-4B70-879F-D817B5B8C517" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_3sj34a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09AD3A53-768D-463C-815E-9F08A92D831F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_5qj90a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46E90470-7047-4C0E-B94B-48C35C386C11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_5qj94a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69CF669A-163A-409B-B5A4-60C3C743BB3C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78625_5qk18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "24BBB240-2CCF-4923-8370-1BAE463CA49C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj11a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "608D4F34-4913-4068-8DE5-6741F5678231" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646E8C43-16D8-475A-88AE-5828D99475A4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6257C6AE-1F2C-4EA0-9EA6-ECFB8EA48399" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj32a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "074500CE-0D14-4731-878F-623FC9982D7E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj33a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF1AC7A6-CB04-4527-A5A0-192FBC8A770F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_3sj34a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFE6DAEE-3278-4E07-A221-06BB9C62AB06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_5qj90a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCCD2D80-0F6A-4225-AE36-FAD77D209984" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_5qj94a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD3C581C-1682-4613-A85B-19D66C196EB8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78630_5qk18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB55F959-E4EC-4A2E-AA71-2904167F52EA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj11a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22C2F8A9-065A-4384-87A4-1125FE57D736" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "38E55904-CF35-43D9-8821-F30E366D8DBA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3429623E-08E9-41E6-B89D-C7841F060575" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj32a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34F3481A-7AE1-492E-9F58-A3F704BAC826" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj33a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2930CBEF-C59A-43B4-81FB-73F4C2686877" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_3sj34a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9DEBED17-BB85-43DD-A42C-DF15255CC5B9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_5qj90a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB615F92-8A97-466A-8271-405FAB3A66B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_5qj94a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DBE50F7-82D3-4198-A319-D39D45E33C3A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e78635_5qk18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAB4F184-EF57-4509-B84F-72A5C519E6D7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87640_x3a86a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A565BEAA-7934-4C77-976C-C484A3513D5C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87640_x3a87a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7626E00-FB5C-4EEB-BF71-DC53F70D740B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87640_x3a89a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE087C6D-C138-40CF-B37E-4888645F4EB1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87640_x3a90a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC5CCB07-F478-4268-AB9E-F2B02A3DE441" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87640_x3a92a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A535312B-F5F3-4496-8686-084599B07C84" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87640_x3a93a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D830A684-2A7A-484D-8524-19BFB9365B47" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87640_z8z12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7896E6ED-77EB-4F70-AF94-87B6CBB69FF4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87640_z8z13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "919F1F02-CB7F-4F9F-A3D5-915D73D2A6E0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87640_z8z14a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1D72B32-1499-429E-944A-0972A65C6DBE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87640_z8z15a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D35F0217-C949-4A28-9186-7928F1B0CCC5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87640_z8z16a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFFAA718-6715-40EA-BC05-C5FC27BF4489" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87640_z8z17a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "965FF9DD-7E83-40C9-A368-06965BE7FC73" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87650_x3a86a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8C988CA-777D-400D-BECC-6865FC858F99" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87650_x3a87a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "323BA228-422B-414A-9980-5CCF1F00A859" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87650_x3a89a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A2AA64E-447F-4455-8E52-878753E2564D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87650_x3a90a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0055A2D-12E1-4087-9980-63F854277FEC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87650_x3a92a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "464FEB08-7C4B-4DCF-A123-629486DC4732" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87650_x3a93a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42EF684A-4571-4486-B09B-C78F31FFC687" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87650_z8z12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "274B208E-3678-411B-87D7-8391D64E6FC5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87650_z8z13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "018F421D-0F39-45B9-9258-54B8B27A081C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87650_z8z14a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "716DC0DC-9BA1-4F9D-B96A-B71E12CEDE03" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87650_z8z15a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAEBAA91-D1AA-41E1-942A-92E295BE77BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87650_z8z16a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93B039C9-EEAD-4176-82B6-74CB93620F8C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87650_z8z17a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4750F30D-3858-4BE7-A493-9C9CDCD3B4FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87660_x3a86a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "851261B4-D55F-4CD7-97CB-B32E76A268C6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87660_x3a87a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76D56ABB-8EB5-4560-928E-564E43D05F94" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87660_x3a89a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64F8418-6524-4F98-8B42-1B3E684B0B18" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87660_x3a90a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3BB7837-2E53-45E5-8A74-7C6830831E94" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87660_x3a92a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC86DB32-131A-4714-A2F5-B18796BC4E3B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87660_x3a93a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED8A9B4A-574B-4446-842C-3064D4930CCD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87660_z8z12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE1074D0-D9F0-4A78-9750-C0B683933368" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87660_z8z13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D356D56-59C7-448C-858A-0345CD462437" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87660_z8z14a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26886FB0-2E89-4E8F-B2D8-7579EAAB7D0C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87660_z8z15a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78CB2496-732E-47D4-B8A8-DBC366CEFF70" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87660_z8z16a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F2FFF4D-801E-4A76-AA0D-FB057140CDCD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_e87660_z8z17a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "746510F4-4CB0-48E3-8054-408954138FD3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_m577_b5l49a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0545C953-797D-498A-8F75-EF397C5D7402" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_flow_mfp_m577_b5l50a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2DF51F52-093F-4E73-BD6D-9B28ACCD4169" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_m553_b5l24a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E27E5D5D-C042-47F5-96E5-30CF41328C55" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_m553_b5l25a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95E4D97F-17BD-4C7D-A84F-9E9555F6765C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_m553_b5l26a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DF2AEC3-4431-4432-A4DB-64F0623D1A99" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_m553_b5l38a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F508B481-384C-4C59-9049-F94B66E721E1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_m553_b5l39a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E442A4B9-2F9E-4D62-9251-AFD8EFC887E4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_m553_bl27a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "178A6BF7-C916-4C76-BD2D-6303C09D0C30" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e47528_3qa75a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7F93130-2D63-42E0-ACB3-953C265FBD3B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e57540_3gy25a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CD7177F-BD34-4F52-B2A3-C3351897B173" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e57540_3gy26a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D315D12-C34E-4AF5-AFBA-B36EBD8E6B0F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e67550_l3u66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6754CB5-8080-4E89-912C-24924A73A2CD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e67550_l3u67a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "622EEFBD-B327-4A6E-9D56-42BF3CDA5110" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e67550_l3u69a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E7C3A24-3D13-4756-8386-48C7985DA22B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e67550_l3u70a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6BA461F-E494-43E4-B739-DB06F50333AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e67560_l3u66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B51B97F-59E8-4653-9F43-9F01FC4F5A84" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e67560_l3u67a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD025E4E-7663-4752-95F6-D61AF83207A9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e67560_l3u69a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89B5F173-8388-4353-868C-7921095ABBC5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e67560_l3u70a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B04F8092-F1A0-4DE6-9F00-AB4610244D47" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e67650_3gy31a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA2EAE3D-0B93-4AF3-B4BD-C1ED5A8F7AD8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e67650_3gy32a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B5E8039-1616-46E5-B2AF-596A369DA174" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e67660_3gy31a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C28C5E3-FF18-4218-898F-2CFDA24D7DF0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e67660_3gy32a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D6A158-DE86-4742-A4ED-49E9AE7159DD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77422-e77428_5cm75a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A94FA65-2FCE-49A1-95DC-F8C63E90F564" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77422-e77428_5cm76a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9EC637A-44A6-4E5B-8E49-51D18272EDAE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77422-e77428_5cm77a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72A29BA5-9FEF-44B6-9862-B268D5EE030E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77422-e77428_5cm78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CFCA302-C1E4-47D0-B001-E9D4ED81CEA5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77422-e77428_5cm79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11EEF97E-3863-43C2-A017-43B43645E760" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77422-e77428_5rc91a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6305978A-FD25-4663-AB40-08226948339A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77422-e77428_5rc92a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4419A5B2-55ED-49C6-A458-1381E0CB506D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77822_x3a77a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27022E88-0AFA-47D5-86D8-C528E1CAB438" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77822_x3a78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6456343B-184D-4A74-8770-F4540D018E80" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77822_x3a80a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "978DE6DE-9B59-41B0-BDA4-FB6EFA79093D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77822_x3a81a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "201E673D-058C-4438-B659-9CFCC63D2391" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77822_x3a83a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66356289-49E6-40DA-B71D-514B36B262BF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77822_x3a84a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C3A1DC0-E48B-4EB1-AB9F-C07B4FE5BAA4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77822_z8z00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D274B6DB-D425-48B7-9121-19F13FC30B53" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77822_z8z01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "368E6C35-05BC-4869-876C-73BF32B010AC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77822_z8z02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9E6658E-5CDF-4338-969E-7C3C5791C1F8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77822_z8z04a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F1AB326-1232-406C-AFB1-A1054A4B8002" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77822_z8z05a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9524F3E9-BA15-4D3F-AB78-8E08FD41F63C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77822_z8z0a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6208AA2-3997-4303-86AD-34864DCB7208" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77825_x3a77a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "091BCFD0-DD01-4D27-867D-2FEE81D63695" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77825_x3a78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C772CE89-A168-40A3-9AA6-94236B5E5609" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77825_x3a80a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A55A8AE-CCB4-45EE-88B9-0DCE58DD7A5B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77825_x3a81a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47CCCECB-10A4-44F7-9414-C2CBC3954B6D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77825_x3a83a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57B3D384-9452-42C4-9D7F-4E665EE82ECA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77825_x3a84a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78AE5729-0A75-4E46-AA63-79C824F30859" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77825_z8z00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F13206E-822E-433E-8EDE-A94BD4EC16AF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77825_z8z01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A7DFD54-AF98-421E-A2D5-E952A6456F41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77825_z8z02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B9D259B-1A31-426E-88BA-DC7A4FF2D186" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77825_z8z04a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0915AA6E-4F52-4A30-9324-49FFD2D3F9D9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77825_z8z05a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8599D01-42FB-4B7B-8BF8-65F22C5C3E37" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77825_z8z0a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2081BB5D-D357-4543-9DDE-8FE967D25843" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77830_x3a77a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72470B3C-2145-4B9C-BB86-55E71D4A67EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77830_x3a78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D1428A6-2BAF-4B78-8F20-12BA8C0D481F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77830_x3a80a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00040DDF-2371-48EF-9F39-7AE990161CEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77830_x3a81a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CB4240C-EBC5-456F-84CC-EE18975E6DF9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77830_x3a83a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52AA1A5E-17DB-4406-9996-BF88C67A04C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77830_x3a84a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87F019B0-BB1F-4FEE-9A92-96AD65C2852E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77830_z8z00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01F12417-94BA-430C-AE25-83D4317043BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77830_z8z01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3261D34A-AA22-4DCC-9347-FB2858A07621" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77830_z8z02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D196075-CAFC-4331-B947-9710B2608ACC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77830_z8z04a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6094F8EA-2E78-42CC-923A-4DE9543D2A20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77830_z8z05a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC0F805C-4EFB-4B9B-BF69-F901996E4E68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e77830_z8z0a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AA9E834-4494-4397-AEF0-3D4392B6A2B4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78223-e78228_17f27aw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "083D8960-1559-433B-A9F7-BA0B5BD676A5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78223-e78228_19gsaw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66AF65EB-8E26-4EAA-91DD-08B3A496C4A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78223-e78228_8gs12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A125C07B-F509-47FA-9E0C-3710A6B112C6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78223-e78228_8gs13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F54CE57-A38B-4F34-8F88-30DB978673BB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78223-e78228_8gs14a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9254F598-49C9-4386-9883-39F449299636" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78223-e78228_8gs15a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "622ABCC1-A574-46AB-BBA7-C6DE38DC5CF6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78223-e78228_8gs36a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BE5154D-CDE3-43A2-A72C-16A9EAEB50E8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78223-e78228_8gs37a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8149722-273E-42FE-9F68-72E044D4A9E6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78223-e78228_8gs43a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "990FE9F5-B58D-4896-BAC3-D7E545D199A5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78223-e78228_8gs44a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78D6A117-950F-418D-B5BB-EC0FB99420B2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78223-e78228_8gs50a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93C236A6-55CA-4C28-A115-444B84B4D799" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8gr94a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BD4B0BA-1CDD-4237-960C-95A15F99C8E7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8gr95a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27B67524-17E8-49DC-8EB2-BF7B54372EDC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8gr96a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0F2CC74-483B-4902-A699-EE9434530B67" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8gr97a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2826150B-2071-4D5C-9541-71C22A9924B4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8gr98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C64E4513-77AB-404F-9A39-32E457323A44" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8gr99a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4AFB9EB5-BD75-415D-A160-02B7B0D4883F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8gs00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A657EAF-9600-4622-986A-D16DD9F6F081" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8gs01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AB156E7-EEA5-41EA-B574-297A77131D44" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8gs25a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6965BD12-351F-41E6-8A91-1B99417FD23E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8gs26a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62F817CF-DC1E-4543-94B1-F49660B3D49D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8gs27a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57C9EA11-9A85-49F6-94BD-B0754FE63308" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8gs28a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3796DB81-7E9B-4337-AAB2-BD8479918866" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8gs29a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BD4709E-6DD7-494E-9877-D111BE0C744C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8gs30a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8ACE9CA-375B-460D-8731-C97BEC0322F4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8pe94a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E516A75-A194-4E2E-BFD6-43682A05DFAC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8pe95a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FF6DD28-5698-4735-9FD1-412A98350241" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8pe96a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0678D817-1311-4CBF-A963-FF909E1FDA80" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8pe97a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AB4DBC3-4978-42FE-8CE6-A058F41EEB49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_8pe98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18B8BB17-85F6-419E-944D-37BBE34A1C5F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_9rt91a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19954458-E68F-41BA-9609-E2D815D809CD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78323_9rt92a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "193FA798-47F3-4E1E-B2AC-659DEB780098" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8gr94a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDDDF216-5C10-4412-A52F-EF4A4306ADD6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8gr95a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "494541D1-C1A6-454E-A36E-20C62A443694" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8gr96a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D60B9B-C843-48AA-BC8C-A56878F38E87" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8gr97a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD6D57EF-7A7E-42EB-B908-2E79CFB46409" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8gr98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85B6E58D-AA8B-46E4-9BA8-F9751EC59C1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8gr99a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E846F09-3224-4BC6-B795-C971DE578C9F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8gs00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDB3DFC9-450A-4600-A8D5-BD239A8F444B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8gs01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4490FF5F-8CA7-45DA-A777-633B4443F0B7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8gs25a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABF2ACF6-C93A-4D75-A182-10D1B6D8CD84" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8gs26a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E21EE331-5C47-4F2D-9FB0-81EF0DE3F24F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8gs27a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA396D1C-29D2-4CAC-B42A-15E20967D785" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8gs28a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DF28C84-F487-4AAD-A5EC-213FC49DB21D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8gs29a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8911F00-008C-432D-BE5F-55B47676866B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8gs30a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC1E8FFB-CB4B-4E80-9963-36708413959F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8pe94a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E390830-EB8F-4338-9470-18DFD44534BE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8pe95a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6434F920-1295-48D7-B95A-282D8BCD0074" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8pe96a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47724A06-538F-47EA-94AC-75D16CC1175C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8pe97a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "749F34C8-C5C5-413C-A0E2-102E43AF95C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_8pe98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "386D277A-96CE-416D-B658-E8167DB39D94" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_9rt91a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC6995E1-1247-40C9-9E93-1E61B457EA8B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78330_9rt92a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDED8E2F-46AF-4BFA-8D00-1A09426423C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78523_5qj81a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A06187D1-14CE-4C17-AF1F-163000FD3374" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78523_5qj83a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "564D60C6-9643-4D4D-B277-D573EAB00D4D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78523_5qk15a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7903EA17-A39A-4B8C-9F98-C7A6712E80BA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78528_5qj81a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22A8D825-3BCF-4569-94D9-FE3C768396F3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78528_5qj83a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F7CBD7D-4073-4CCA-A3F1-537B0E828C52" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78528_5qk15a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "675ECCD7-6195-419C-B164-1F75C022511B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e785dn_5qj81a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B48D26C-6906-4773-B476-B8077DD94923" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e785dn_5qj83a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BB7FE36-3A56-425F-936E-63FAF780611F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e785dn_5qk15a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63667790-EA15-44B1-9626-6134A6764B1D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj11a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04CE9734-77D2-48C2-BCEC-478DFF7D4B9E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5D83BC1-5F74-4C7D-8F94-CCF61BB2FA70" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BBC33412-F235-4086-9D0B-6A3BE02ABA89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj32a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "804790EE-7273-4819-ABC4-A1F361CF7F09" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj33a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CB0A322-8626-4BE4-ACF2-DA10B3AEEE68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_3sj34a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BDADE48-C56D-4DD7-90AD-684D7E42D146" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_5qj90a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DAACF9B5-F22D-4656-A1CA-FA524394356A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_5qj94a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65A2548B-DFC5-48F9-889F-63FC1FA4E685" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e786_5qk18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4265F995-037C-46DB-BFBD-6E3B815CBC99" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj11a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5EA3CBC0-518B-4E83-B2E5-31143D4796F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "645DA26B-44FB-4135-B1A8-2AB85242F026" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF4ABFDE-C8B6-4ACB-A3DC-AE574579D267" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj32a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74E07A92-13AD-4D5D-9156-3F649C05ABF3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj33a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9E756B5-EFCB-42D6-BDAA-8DF29D047601" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_3sj34a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D48AA6E-D4DE-4D29-A0E8-5263BA48B6D4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_5qj90a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF117354-4AB4-4FD0-A7C7-193A6C53532B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_5qj94a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4069F38-5526-4022-8750-F39B4D9F74AE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78625_5qk18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F777F47-898D-4E8C-910D-30EC284542B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj11a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97B9F670-D840-4310-9130-DA70C2A53BCE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFF1D948-714C-4F6F-A421-453FEA222C3C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8DE275E-E68E-47C7-B634-7F9E9BAE225F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj32a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42BA52C0-AF76-4C9C-B3BB-9DBB555DF30E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj33a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0FA1EF8-C7EC-4858-98E3-C6FF124DDF23" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_3sj34a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCC0344E-235B-4691-9837-CECB5F2F8104" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_5qj90a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46AF16C0-05DD-41CB-B723-7759813D69C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_5qj94a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28B9C4E1-7760-4BD7-A21B-28392F62CB2D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78630_5qk18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CA80B3E-EAE6-458E-8BE8-85ECC3BF0E07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj11a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6EE13A37-F325-4048-83CC-08BBDBDF96BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1AEB975-0424-413C-94B5-BA6613703B77" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F37D5DF-6810-4B1C-9CFF-4EEBF76D240A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj32a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96D353F2-8843-4D67-95F7-4DB6485F9583" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj33a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3DBC5083-B6BF-4062-ADCF-E059A96482E1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_3sj34a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7902D29A-DB55-4D70-B4AF-830217534B34" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_5qj90a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA87705E-6F60-4135-A301-7369BC479240" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_5qj94a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CEF744-61EF-4478-98CE-01B811F87F2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e78635_5qk18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13CD3F57-65F1-406C-A36C-A8637BCEC1F8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640_x3a86a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "145DFAEA-17EA-4823-B9D2-B24FCC1EE562" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640_x3a87a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "38E5ECBF-0917-41BB-82C1-3DE3726EE1E1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640_x3a89a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58CA63CF-E454-4DC2-A8B2-AC90711F5656" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640_x3a90a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9EE943-D6DD-4A15-966C-76DE4D8BB848" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640_x3a92a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "311089FF-90E4-460E-9AB7-B5BD204F1550" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640_x3a93a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C642AAF-5538-4B57-8B02-BBE064B7EE8F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640_z8z12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "343B0661-26C3-481F-A930-566DBF5219FD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640_z8z13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDCEBDAB-1E14-4D26-B36E-8E2342A21D3E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640_z8z14a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07A20AEA-F139-4200-ADB3-6447D4316381" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640_z8z15a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9759A5F6-45E4-4A22-AFFE-8424000668CD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640_z8z16a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A191FC08-1789-4CB8-8CD0-86122F50DEC0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640_z8z17a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C6F1FB7-FBB7-487D-9517-98AE8955F174" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640du-e87660du_5cm63a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC467C1-58B7-4714-BC89-94717E99471E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640du-e87660du_5cm64a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34CA79B6-63ED-4A6A-8A45-654FB1B99FEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640du-e87660du_5cm65a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B6A942B-6195-4600-9D7F-0659761DAA94" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640du-e87660du_5cm66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "146C3203-DD26-4AF2-ADEC-C94BC2B7378A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640du-e87660du_5fm80a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7648BFE-2731-4462-8D70-4C0F3F77469B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640du-e87660du_5fm81a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "096DDD90-B502-4E70-BDC0-4F6957642400" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640du-e87660du_5fm82a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FAFC3EB-EACD-4740-8A93-EBDCBAA9AD80" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640du-e87660du_5rc86a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD613CB9-0DA4-42DC-9209-AD77982624ED" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640du-e87660du_5rc87a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07CEE4D1-1EEC-4B6A-9AEA-A0DB858A7C43" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87640du-e87660du_5rc88a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0B48FFF-A35F-4A4B-A6AF-1CDCE6A29590" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87650_x3a86a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15FD54C6-ADB7-4BF9-8D04-EBBE7FAF9EF0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87650_x3a87a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E87ACED0-6CBF-47D8-BD83-2C10BF0E9BAE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87650_x3a89a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8E8F1D9-C249-4792-87E9-635C502464FF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87650_x3a90a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B1CB20A-CECA-4ABA-A09B-5D675DEB7CF9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87650_x3a92a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADD70C3-EB35-4CD4-B32E-0DACF5A0F832" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87650_x3a93a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2EBEA09E-0CC4-42BB-8AE9-B24885A3A7A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87650_z8z12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6FC4568-6815-4CA8-B4BE-C19D99F94A8B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87650_z8z13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1009E8C4-E2C1-427F-832B-A4A0E937CC45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87650_z8z14a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB1CF596-03CE-46E5-9958-90E6ABBF09E2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87650_z8z15a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E181548B-6AAE-4E08-A50F-CD0DEF92F85B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87650_z8z16a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86A954D6-A823-4425-A43E-A23980D0815C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87650_z8z17a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "583A3C4B-A17D-4AAB-B9E7-CB259D5A19CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87660_x3a86a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABBB0718-CF00-4705-A829-8284AA9F800D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87660_x3a87a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8674C6E6-3D69-432B-8444-A60F92FD3D19" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87660_x3a89a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "363D3583-46B9-4345-AF1C-351BC8807548" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87660_x3a90a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E20AA1D3-7330-47B9-ADA9-61170E244770" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87660_x3a92a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3989B420-9433-4D60-BD43-4C1D9A3A0EDA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87660_x3a93a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4556ADAE-A075-490F-8E56-68420B60FF93" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87660_z8z12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6673E32-F9EF-49EA-8A7B-D6CE539A5B32" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87660_z8z13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE7FE5EF-50A5-48E5-B7E7-8AF0E57555A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87660_z8z14a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF1BDD49-F017-4309-9357-D1EAEBF42412" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87660_z8z15a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5EEB505-7E49-406C-A850-D4C4E2F2563C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87660_z8z16a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "175A294C-8D48-47B4-895A-8D46B7A0F5AF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87660_z8z17a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A445035-FBA6-4F82-B8E9-D0E5993964E7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e877_3sj19a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63388906-509C-4FCA-920C-743CCC8EC553" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e877_3sj20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C69D499-D224-4AA4-95C8-C38C3BED8B98" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e877_3sj21a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3BAAA887-0D91-4F4E-9C7B-8920FC6490A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e877_3sj22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F427F5C4-E3AC-4608-9B3E-0A3434B5A557" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e877_3sj35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "074F3CDC-4BB0-4948-A07A-16CD4355785F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e877_3sj36a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1984F94E-F4FB-4D60-B649-7FD4D7A658A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e877_3sj37a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D766885-1A43-4766-8B88-D279BA120E1E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e877_3sj38a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2DD54BDA-99B2-46EE-A5CB-B186D1717B77" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e877_5qk03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92621BC-FC02-4951-8EA1-81D6569B3853" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e877_5qk08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "820A5B8D-A1DD-4610-A5A2-75D068A4D7E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e877_5qk20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66E43DED-7C07-45C9-83CF-FC393DC77FC3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj19a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3E444E7-7BBB-484B-BD11-962AE3E38EE6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9790543F-1031-4CEA-9188-902F94B4177E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj21a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0E3C70D-DDC6-4048-89B4-23CCD6608664" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3D3F1A2-91FE-4473-81E0-DA18EC6AB421" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A7B1238-D14F-4AED-876D-BA8B428222B0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj36a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91F7BE1C-6C73-4E7F-AFA6-37B92D6768DE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj37a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BD14C3D-98B1-4294-8B80-E46B159A9B80" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_3sj38a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A41C224-FC13-432C-8016-C94702F365A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_5qk03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92E318A3-5C9C-4A5F-BA74-1457B6F7C907" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_5qk08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4A841D9-953F-4520-B69E-6D3E1A378C56" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87740_5qk20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DE03981-5A7A-48CE-B520-39871A8ACF1F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj19a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFD60EF5-48F4-449A-9C24-A588C758AEA9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0B2D188-1BB9-4DE9-8E09-56AACD762243" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj21a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A39F3A2-D138-45A5-866E-179EADE922E2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5152BC66-CFA6-43E2-BC33-DC12F01E78E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "603CE3C6-FD1C-4308-A62E-0E17FDE9A8F7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj36a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC7EBA7B-CF60-4FFD-A3B5-AC8F7DFB7B7B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj37a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2986081E-FA64-47F4-B51E-979102A7505F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_3sj38a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88CEDE0F-7C47-4B24-800D-A1C0013FC139" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_5qk03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3904D471-29BE-4D01-9456-17EA2683FDC3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_5qk08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABEF6723-D233-4553-B229-B0A13101CED0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87750_5qk20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00B38865-E47A-4A36-AAE8-F0513B5EA91E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj19a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2FA9E83-EC1A-45DE-BA53-5D083C7CB4B2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF47F0E8-1E91-4387-99E4-0F83AFAB9DD4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj21a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C1A1DE39-18B7-44F1-A34F-919BD6416697" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DACB1A75-FDC8-420B-B03B-E9C9B9B96D8D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FB2FAF3-C8F6-43C6-9B83-6F3581AD7F27" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj36a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3340444-16E3-462E-880C-8C53FDED3A19" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj37a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "739F6E1A-A923-4A4D-9F13-95B92B35F57A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_3sj38a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6B4AD70-AE9B-47CC-B024-5C0D9088D172" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_5qk03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F13C8695-503A-488B-AFB5-1188CF50349C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_5qk08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB275168-8B2E-43DC-A002-340C6179747C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87760_5qk20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE83621E-42E5-41BE-A089-CCBB1D96F69E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj19a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D256FA9-8545-4853-AD8C-BC9FD55BEDED" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15F68C71-B30F-4BD9-9416-E968AE287D0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj21a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8A7148B-5119-4BFE-87FD-9ABD1117D959" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8115D24B-8E60-46C4-B311-7F2F943A539F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D842011A-3DB3-478C-ADE3-C15EE5E37640" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj36a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFA1D0A7-E4B4-4D0A-8232-E560C5BA60CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj37a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF9DE8A2-83E4-4333-BB21-1E25B38E0CE8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_3sj38a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC6EA72C-969C-44AB-99B0-43937C029BB6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_5qk03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13433B4E-1738-4444-BE67-37B73697D3BE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_5qk08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3192691-7EE1-4387-9DBC-B0B25FBF6F86" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_e87770_5qk20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F2CAC54-A17A-439C-805D-CD4522700F19" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_m577_b5l49a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2C25AAE-5E93-439E-9786-1E793351C289" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:color_laserjet_managed_mfp_m577_b5l50a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB15E940-E2CD-4F3A-BAD6-2A2B78DBCDC1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:digital_sender_flow_8500_fn2_l2762a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B210412-F0A5-4FD8-B29E-1CCD15E13471" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m527z_f2a76a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28DEBE73-7589-4577-AC48-2DBC3DADD992" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m527z_f2a77a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3526A204-4D4A-4D9B-B4AA-04EF15A98DEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m527z_f2a78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "080795C1-DFAD-4881-9C0D-687791893893" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m527z_f2a81a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1389E378-7FC1-4937-BD30-8B8BA566B067" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m631_j8j63a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A038829-E125-4946-BEC2-BB5BDD3A07FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m631_j8j64a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13515EBD-ED56-4B81-BEAC-1E7B05893E76" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m631_j8j65a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F7B6781-7DA3-4365-9281-A96D8559B89B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m632_j8j70a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "586886EB-E2A2-42B9-8928-548E8665D43E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m632_j8j71a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FC608E4-3EF6-4C55-9CEC-E0F57AF30A2D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m632_j8j72a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "359CC6E8-12DC-407C-903F-7E904A121AE0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m633_j8j76a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C126563-2EDC-4B4F-85A3-6937D3B08D87" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m633_j8j78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA003F17-29C1-4B0C-901F-B9A16D81804E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m634_7ps94a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9AAAD739-1275-4F43-9183-C04A9D82F0A7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m634_7ps95a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76003BBE-528B-49BA-AA37-746CF1F4474F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m634_7ps96a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4AB251CF-9999-4CCF-9B4C-76D59A0D1D23" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m635_7ps97a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BA9E473-BA5A-4E6F-9114-AB7C5AD8E6D1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m635_7ps98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B008B0F-0E50-4557-97FB-1F392756B4CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m635_7ps99a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C7E1B06-A8B2-4CE9-9C17-D150CB0C1784" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m636_7pt00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9FA4160-E071-4FFA-91D1-ADDD7211BD74" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_flow_mfp_m636_7pt01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A09B55B-6133-41BB-A652-F7DA699F5A96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m406_3pz15a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9046816-A379-4618-8F9B-DA79565604BA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m407_3pz16a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E90CB6AA-79C5-4B58-A135-CD2F7ADB78BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m506_f2a66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2F49ECB-E8A7-40D0-81F2-82D79BE69B75" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m506_f2a67a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69831470-815F-4228-BAA9-3A27EB2AD53A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m506_f2a68a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E358682B-8033-41D7-B565-8D7F0FED773E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m506_f2a69a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F02036FD-0F28-4C56-85B9-DBBA961A1C87" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m506_f2a70a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8699A702-F69B-4327-A08E-4702D91DFCA4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m506_f2a71a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BCC86B-5878-478F-9C86-A6DC2CD54334" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m507_1pv86a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B94F4583-CC33-4350-B996-D1E238EEF0A9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m507_1pv87a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5EF8EDF-5AA7-4E5A-AEFF-D8B2AB8BA971" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m507_1pv88a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B768773B-0F3F-427B-AAB9-04D12FB9C807" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m507_1pv89a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA4CADC9-B0BD-422E-A6C0-21ADD984A605" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m607_k0q14a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04408A7B-DD5A-4DA2-8A05-AD0A9C0362F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m607_k0q15a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B9A9453-C822-4343-8550-C3D82A5DE3FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m608_k0q17a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD70DE1F-3D25-46BC-8481-5FCC3583E12C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m608_k0q18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFBCB99F-A0B3-4C7D-A40F-0168AEB833FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m608_k0q19a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85C609A0-A5F5-4D24-A4FA-399952AA2CB7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m608_m0p32a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6935355F-94C6-4600-9724-4E961C5370D7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m609_k0q20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4926D9A-7E6B-46F7-9F9B-34ECC6098630" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m609_k0q21a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75B7FD81-821D-4FAE-9719-4A1A3C7716C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m609_k0q22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A724AFD-FB55-40E7-B674-9C7584509066" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m610_7ps81a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BE9B132-D9EE-496A-8F73-BB6786E5CAEC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m610_7ps82a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3656FEE1-5FAF-4322-BF31-0C6893262BED" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m611_7ps83a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA8BA4BE-40B6-4A8D-AEE2-3B78CE1CB836" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m611_7ps84a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA69C3A7-3FCE-4B17-A08B-9CDA301137CD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m611_7ps85a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23AD00AA-6A17-4CFA-B4D6-BBAC4687FE0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m612_7ps86a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3A8359E-7BC2-4176-A390-72C226C379C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m612_7ps87a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47F4D2B8-10C8-40F3-A0A1-60924A988888" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_m612_7ps88a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B5393B0-97B2-4DE7-87F5-9ECEF9CBFB18" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m430_3pz55a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E813421B-5398-4324-A0E1-C4AC47A91765" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m431_3pz56a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09C0A5FB-8FF2-4C14-B387-A48EE506471B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m527_f2a76a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE3B23F-AB99-42C6-A2B7-0FE72CBBC871" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m527_f2a77a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "656A3546-E613-4A99-95D1-2B07E8F8B53B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m527_f2a78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B79AD2F-1ADE-46EE-A5ED-F36DAC9E0612" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m527_f2a81a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDB1F15F-E4FE-4779-BA31-8BF3384B7259" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m528_1pv49a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E8E367D-15C7-4B7A-8345-3ABDF6149765" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m528_1pv64a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01BFA169-42BD-4FDD-8FFC-C1F26EB560A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m528_1pv65a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27D361F3-AA12-41EC-A767-0CD30015E965" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m528_1pv66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56165B62-93B1-4196-BDC0-9E535E5C1197" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m528_1pv67a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BC2BEDE-6C53-4A56-AAD8-1D640A23A464" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m631_j8j63a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56ED3228-6F60-4426-AE5D-59E27F038F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m631_j8j64a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B973E98-B20F-496B-948C-118DBAB41F7C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m631_j8j65a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9CF2267-E633-4436-A719-268E40F2022A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m632_j8j70a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1AA8357-4BE9-4582-B48B-BA073DFDEE2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m632_j8j71a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16693C96-54D7-4FD3-A94B-C6B87132F713" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m632_j8j72a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "108AC5F3-A4C2-4082-8436-8A3CF1F5ADA5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m633_j8j76a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE08FA2B-D63D-404C-9C38-E41FA80D3B2B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m633_j8j78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CB24FE2-7D04-436E-9860-F1FBCB1BA42F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m634_7ps94a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62D9F291-77C0-4048-A3C0-6410DDFC22C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m634_7ps95a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E23BB6C3-B09D-452A-9431-2DFF68E9C831" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m634_7ps96a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8210E03A-E6D7-4E48-AC13-39DF19CBF8DA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m635_7ps97a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "231B4FC6-9267-45B2-A598-2BCDC89D8F69" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m635_7ps98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BAF19B7-AE74-460E-92CB-317FA7C64F69" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m635_7ps99a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E85301EC-5DB7-4870-90A2-F1E97EAFAE04" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m636_7pt00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C57476E6-2E83-4E49-8409-D3EDC4248ACC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_enterprise_mfp_m636_7pt01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96ED276B-76C0-44A7-AFE3-5789A202E4F3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e40040_3pz35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B64B06F-9D8A-438F-B5EE-4890AD4AA7AE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e50045_3gn19a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29CBA698-1E72-4062-8E4A-1D1C328BBB0D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e50145_1pu51a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE4A69DF-5244-4ACE-8C39-095FFE685C5D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e50145_1pu52a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F50A7D42-DABB-460F-842C-F88CBB389B44" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60055_m0p33a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C65FFABE-32D5-49CF-852F-5723CA6EDF28" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60055_m0p35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "568F29CA-5B02-4870-A609-356E152F9C7B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60055_m0p36a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9F41BD9-0D10-4515-8DA0-DFDFD9AE2CC3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60055_m0p39a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CED8A58B-E8E2-4C47-B84E-570045301C0F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60055_m0p40a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66CFBC6E-B18B-4DD0-9716-AA914421FB17" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60065_m0p33a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0238C700-1607-490F-AA21-C9404F2ABE20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60065_m0p35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FAED4D6-8983-4833-80EC-8E37A9239028" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60065_m0p36a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFA8C3B-2620-49DE-8F95-E6469428C3FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60065_m0p39a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3DBCE4CE-F9B4-4E76-8DA3-60E20C45C91C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60065_m0p40a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72EC02CC-A917-4BEC-B0EC-3CB278067551" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60075_m0p33a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA150499-9E4C-4730-B2A6-27AD918E554A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60075_m0p35a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A0135CA-F8A6-47AA-9B1B-B21EBCFFDBF3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60075_m0p36a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "512998C3-5135-45C5-9CC4-993D915E70A4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60075_m0p39a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "345C022B-1622-4154-94D0-824D41CB5DA9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60075_m0p40a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA2E1301-6715-4C37-8B88-3AF56A2411A5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60155_3gy09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ADBEBD9-6AB4-4D4A-B254-B206F5A225A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60155_3gy10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A66C691-7672-4A29-BC3E-BDC67752E8CD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60155_3gy12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D65D34E-39C5-42DD-85ED-65AAA0427932" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60165_3gy09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1C8A986-E7E5-41CC-9929-6FBA3774CB99" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60165_3gy10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACBDEFFB-70EB-43D4-AD97-14B43666CB4E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60165_3gy12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99DE3081-B694-4769-9276-F0A1F56A84C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60175_3gy09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50C4AF15-C882-4167-AF81-FC60478E72D8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60175_3gy10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2541B611-76B4-4210-BDF1-00FEC7149558" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e60175_3gy12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A854902-7851-4D16-97C1-8D51272B3FA4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82650_3sj07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21D38870-FE0A-4F25-B942-D38000093738" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82650_3sj08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B5DC303-57DF-4639-8A42-8F4B718E51A5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82650_3sj09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "893F6FA8-08FA-46DE-8208-EE920F9D7F03" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82650_3sj28a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59139A5B-BD64-4A61-A152-A61359496CCC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82650_3sj29a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71040744-1226-446B-AB30-69D2C507C8FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82650_3sj30a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6ECB9949-16FD-44E9-82D9-06A78C135FBE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82650_5qk09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32A4114A-8A27-4DD7-BA4F-C7B816D4F4D9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82650_5qk13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "38701B92-B6E1-49BC-98DF-312C96BA4598" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82660_3sj07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7FBCF51-60B7-4C17-A852-8F2191E89578" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82660_3sj08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52850805-B666-4BD9-A1EB-11BB2EE9A7A0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82660_3sj09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0953A337-BA7B-4FFC-9DE7-C9C1B0FE84F7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82660_3sj28a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CFE575D-0522-422A-B72F-74E674C7ECDA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82660_3sj29a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2DF4FC27-E425-47BC-AC37-177D05716CB2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82660_3sj30a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF7B7838-1D7E-4F41-9D93-8E47C62D1561" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82660_5qk09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFFBAEBD-C974-4F9B-8FF9-E5E22CC31D6A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82660_5qk13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F5856CA-996F-4817-88E9-C5BAE5AA61AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82670_3sj07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C83A42EC-C009-44C6-B681-92418668FFB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82670_3sj08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "321EB81A-80B5-42E3-BA60-5C80E505AC7A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82670_3sj09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74A11B58-D484-4712-A471-9C1344E51C33" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82670_3sj28a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7528F3B3-56A0-4DD7-950A-D4DB9FAAC434" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82670_3sj29a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "544650EF-8ACB-4F22-AA01-BEB2CD57D4FB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82670_3sj30a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9973FB30-B7EA-4503-9D85-3F96FDA4F2B0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82670_5qk09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9B484FD-FE59-48E6-8FAA-96AF2C79C4D9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_e82670_5qk13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E4A03DF-40CA-4E2E-BAC7-A558335774E1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82650_3sj07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3079453F-56D0-414C-92F4-4C12A7ACAE65" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82650_3sj08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A51EE7C6-55F1-4454-B951-D0A7D1528AFD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82650_3sj09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D040946-BEE3-4B07-ADE7-9CAB944174B7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82650_3sj28a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7975D291-C474-4D25-A7F1-B3EBC702B59A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82650_3sj29a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "176F8083-8F33-42AE-AE7D-88F33FFDA8C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82650_3sj30a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A37B865D-D53E-4D97-B58A-16D1D176DF73" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82650_5qk09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22ECD411-E82B-41C0-8071-367D5C4E41CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82650_5qk13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9492EA2C-719A-4603-ADA2-422A4AAE1D63" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82660_3sj07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2DC4DD9-29E4-47FE-8387-9857668712FD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82660_3sj08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA82C2AF-01B6-4E72-8FA2-06ADC8439059" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82660_3sj09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74A991B5-A409-46F7-B0D3-D8F85160C9E2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82660_3sj28a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AAD0FCB-AB33-429E-86A4-15487D200270" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82660_3sj29a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "546E0D7A-DE3E-4771-A995-A1BC7E884710" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82660_3sj30a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35121F61-38DE-4CEE-BED7-30D55E40B9CF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82660_5qk09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63E10FBB-DF59-4C65-8A0A-84109F0CD8BD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82660_5qk13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77FE2181-EF04-4D3A-A275-4FE3778AF3CF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82670_3sj07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20BA6617-06E9-46B6-BE20-FF46AC36B336" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82670_3sj08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51AB1216-DB59-44F1-A2AD-2B1D2E57C528" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82670_3sj09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D39F145-43F4-432B-AA96-F707F2D44775" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82670_3sj28a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A30BE95E-E39C-40E7-B2C9-BA650331AF26" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82670_3sj29a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B83D800B-9E85-4484-9B07-71AD378231A5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82670_3sj30a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4D3BD7B-4E3F-4FDD-9A7A-1667FFE61EEA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82670_5qk09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "717784DB-93F6-4656-B199-BB9B0DD4FA5A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_e82670_5qk13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52FA4CA2-4D93-4D5B-A11D-59ACC7F9B32A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e52545c_3gy19a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1DB45838-02B7-457F-B915-2DC8982D6CF2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e52545c_3gy20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0B788AA-5E76-4394-9588-ECD28105D80F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62555_j8j66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98A83E70-BFA7-49C6-8B36-1FB7F38C0623" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62555_j8j67a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20C52BE7-5676-46E5-9875-1D64DE4CD56E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62555_j8j73a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21BDE654-E7E7-411E-9CE2-EF46555ACC89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62555_j8j74a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96D241CC-3B84-43AF-9888-8E333841A603" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62555_j8j79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE8AF365-2691-425D-A5A6-40F5750DA808" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62555_j8j80a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C1F84F9B-CA8E-43D9-84EA-C7E42300BE4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62565_j8j66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8969F997-D4E8-468C-9574-F4E9711D060E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62565_j8j67a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADCCF129-A27B-42AD-BD2E-D253858BF6EA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62565_j8j73a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19DC82B6-3ED1-4CDA-95C5-558BE855BB3D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62565_j8j74a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE745706-EA48-4331-A839-94FE2B9D3588" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62565_j8j79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4E377B2-4E82-469B-A378-C8D4AD17E515" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62565_j8j80a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8862382-0F86-4BD3-8345-5E34D0E4E900" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62575_j8j66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4B4E4C5-815D-4A6D-84E3-07C235924B57" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62575_j8j67a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2A58098-78D8-4C57-A6B7-8BF88F5AA1E6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62575_j8j73a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "255DCFA0-E48B-4B7F-931C-C5D1B4482924" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62575_j8j74a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51859349-5DAB-4E86-8A21-8EFD7DA114A0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62575_j8j79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "869E93F7-9794-4648-A096-984CFE6946E6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62575_j8j80a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62258794-8B09-4497-A4E1-E4A3748CAC43" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62675_3gy14a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4254DF2-AD54-4FBC-AD0B-B489EBE2B891" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62675_3gy15a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89B4B40A-9018-4EB1-A381-4D6FBCDB69DF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62675_3gy16a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "604E3CB8-4D4C-4986-A614-5004B9352785" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62675_3gy17a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96381BC5-C06E-40AA-996A-59235B59F8BE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e62675_3gy18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6592CF21-1808-40A9-9D35-38F31AC201A4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72525_x3a59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BF2B3BF-4312-40D5-9610-79D9467894C7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72525_x3a60a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B843475-022E-4351-B261-3C7961C5A30E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72525_x3a62a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAE782A9-2458-4AD5-8907-621548627C4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72525_x3a63a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "980326B3-1EBE-4E25-8D61-3F074D72FE49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72525_x3a65a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AB1944F-19CC-4963-A5D9-A74282FFC1CC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72525_x3a66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A647E55-9F84-453A-B292-17672BF4DDDE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72525_z8z010a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "560D017B-3A90-4650-8CA7-CB8EC1D278C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72525_z8z011a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC1F0C9C-C4BA-4CBF-BB1B-37C6366ED3E0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72525_z8z06a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F01D8479-AEBC-4695-806E-2C0BA5F034B9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72525_z8z07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2D164BF-9724-41CA-91E1-022B18CBE671" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72525_z8z08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D424790-A782-470E-B2EB-2E73EB5EDAE5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72525_z8z09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "136DD766-9BC7-411D-8C39-BE2168438976" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72530_x3a59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C509AFE-DA0C-4B16-BF64-2A6E4F031400" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72530_x3a60a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44A73194-9BBD-4044-AD1B-6F89A19955EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72530_x3a62a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D2081C33-08BD-4924-91EA-DDC760D59900" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72530_x3a63a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C7CC245-41D0-4A82-82B9-CF45BDC3BE2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72530_x3a65a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C263A5C-001D-4E7B-BCC0-C87CD4FD6290" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72530_x3a66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B56D878-A141-4A67-B7FB-448D113F2E8E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72530_z8z010a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCF9D016-F42C-4383-99B8-DA104137E8CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72530_z8z011a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B430EC75-5F4D-44DB-A300-0D97B9FD493B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72530_z8z06a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "24E299B7-2A94-41DE-A1CA-51C81A0E07BA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72530_z8z07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FAD8448-1218-4385-ABD0-D79110674640" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72530_z8z08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41FEA740-6B12-44EB-909A-181C7126E9E1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72530_z8z09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F1191C0-1E49-4B32-BE97-D543916CBB93" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72535_x3a59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B4EEB55-7D85-457A-BA48-2CC7E96B106F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72535_x3a60a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA5703DD-7728-4B57-90DD-40447000FF4B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72535_x3a62a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD936313-FDCA-48CC-819E-554039B7FC19" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72535_x3a63a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF23B5B4-9AC1-4F07-BC53-203C846A21A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72535_x3a65a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A771D9B4-3160-4CC7-AF89-84DE137981B3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72535_x3a66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40428FCA-657D-48DA-B861-841406BC0C71" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72535_z8z010a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A23C866-C892-4478-AC55-5D9F9F66182B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72535_z8z011a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC2420D1-1D28-4733-B97F-297B89BB3111" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72535_z8z06a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06BEC044-63DD-4CBE-AB7C-317D0434395B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72535_z8z07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE10F9DA-797E-4913-85EE-39685CDDF210" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72535_z8z08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E908241-1BF0-4907-84AA-2E20E575694B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e72535_z8z09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD2A25F4-36DB-4A77-A421-302D0D065C04" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e731_3sj00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7436FD8-E492-43FA-8B23-E39D45506EB9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e731_3sj01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1879281F-DF6C-4395-947C-069C66E873A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e731_3sj02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B75F6E1C-FC5B-4ACB-98BB-05D09DA85D73" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e731_5qj98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E5EE46E-B716-4B49-B92F-AA9597519C12" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e731_5qk02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E370E505-BC35-4F1D-A137-45D69CA113BE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e731_6bs57a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E7DBAE1-B2DD-4BDB-A2B1-2DD9E7C47EB0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e731_6bs58a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B0A01D3-986C-4516-A52A-EC1CE35628F4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e731_6bs59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20265B12-B94E-4C05-A9DF-129EE4EE1327" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_3sj00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6038275-76ED-496B-B210-5D388ACD79D9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_3sj01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09F4D61C-BAE7-44DC-BB8B-4248AF00338E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_3sj02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A44853CF-882C-4FFA-8137-746E0D6890B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_5qj98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAA9563E-ED31-45B6-8F0D-A34C0B10BF0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_5qk02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE1EBFFC-615D-410F-A8BF-937556EB4E6C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_6bs57a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC7F77B4-D9E3-427B-A2D8-89B5FF12DC0A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_6bs58a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "390FE074-EA05-447C-99A9-5B8A52537AE9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73130_6bs59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C8A1723-7C32-42CF-B926-AAB27688C16C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_3sj00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F75FCF29-3989-422C-8D21-EF1A08326244" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_3sj01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "634C3EA8-DFCF-46FD-B538-E3A7D17E942F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_3sj02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32B8C712-3985-4622-A78A-E3F19D215834" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_5qj98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "10AE01FD-7831-4714-B4A2-0313F5BE24DF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_5qk02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2545B59C-0BA4-417D-9297-0A55CF9EBDE3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_6bs57a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B0E6A9B-A1A4-4D6D-8D39-8C32E3B3CB6A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_6bs58a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3ECBF7C-FD7C-4DA2-BFB6-45687D27B44C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73135_6bs59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F544BC2-1B93-4933-9629-B0597FD30BD6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_3sj00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C762BE9-4FB6-47EF-A19F-1B5BEF99308D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_3sj01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B3463E0-93E9-4C5F-9E5F-74332BA6D6EC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_3sj02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C251872F-5135-4D39-ADFD-AC4A04A6A2FA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_5qj98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF513C8A-5874-4A97-B828-F771498010DB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_5qk02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6004E42-5E68-410F-945F-84F75213759E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_6bs57a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC8AD7A-160D-4E24-A81A-8EE15FF1310C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_6bs58a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BBC01D51-FDD4-457B-B023-629119307116" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e73140_6bs59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "784F5C51-E937-4A28-A64D-8874CE993D89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82540_az8z20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07A59065-E70D-440C-8A80-B74EAA6BA6F9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82540_x3a68a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C82FF295-20FF-497E-B2CC-65570728BC89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82540_x3a69a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8889B8EA-9762-44B0-ACA4-0D1AEC636BE4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82540_x3a71a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACBD3F03-939B-4FE1-A76D-137E0B331DDA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82540_x3a72a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF77CF30-316B-4016-8ED9-3FF43BFD884D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82540_x3a74a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A76E704E-4E9E-4590-B596-1876C4179D63" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82540_x3a75a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B7D6075-D1C9-4586-A7B9-A046F128612A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82540_x3a79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C4ABE34-B31E-4BC6-8589-0FF10602DBA1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82540_x3a82a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA4A9AE5-1694-4154-B059-59BA38BCA468" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82540_z8z18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFCA8407-66EC-41D6-A41D-DBDCA2EE7D63" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82540_z8z19:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C473295-40DD-48DF-9B8D-BD3A7045EDD1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82540_z8z22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BCCADBC2-0014-45B1-8CC6-056ADA22B26A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82540_z8z23a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0E8B2D0-BF91-4C01-A3E7-6D3B22F9BA51" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82550_az8z20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D02688D-38B3-4042-940C-D42B22490E23" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82550_x3a68a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6442DB9D-6A94-4C62-9D35-1B68B8A91A4C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82550_x3a69a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB62A2B2-E45E-4B78-BB99-27F8986A268F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82550_x3a71a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D7B886-2DB9-4617-8CBF-8697EEC148D6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82550_x3a72a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70A6436F-29EB-4341-8749-459262F3BC67" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82550_x3a74a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80322BAB-B626-4DDD-AB6F-BBE4956DD5DF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82550_x3a75a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D4FEB7E-2542-466B-90CB-1FF5ABA890CF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82550_x3a79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "003D5506-729F-4376-8A94-3A0177674739" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82550_x3a82a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05A99367-2D78-455F-9285-DD6B73BE522B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82550_z8z18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B147DFFF-0FEC-4607-A8A4-1364D3B004BA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82550_z8z19:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1E7BE69-3D6F-4050-A61C-34C8F773F6A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82550_z8z22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA1E888-E0F1-46F6-9EFC-93651A544106" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82550_z8z23a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F45A1EED-E429-4293-BD2C-001892C146CC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82560_az8z20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "500E82F6-16F0-4221-B7DB-A8A3D0900EDE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82560_x3a68a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D7CC009-E841-433F-B1CF-69D8FB605238" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82560_x3a69a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCDB5D2E-CAF3-40E2-9480-5E8D174FB05C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82560_x3a71a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "994FE039-DBC2-458B-AC5C-9027EA7A5F53" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82560_x3a72a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BF74BF2-F719-451F-9CD2-C73F2C5984FA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82560_x3a74a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBA13EF6-53C6-4A5D-8927-B49F83985751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82560_x3a75a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5F469B5-34CA-4FF4-B9CF-D9BFE6991B1F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82560_x3a79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26BBDC74-CF9A-4310-BE1B-B6EC7184054A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82560_x3a82a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E2F3A4D-964D-4511-8283-64BF93DCE537" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82560_z8z18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6302536A-8DAE-4B69-AE94-43CCEADD81F4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82560_z8z19:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB6ED9E0-AD0D-42E6-890F-24AE6ABFB7F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82560_z8z22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55E2F588-D5CA-49D8-8A02-9DDD9958BD32" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e82560_z8z23a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EC4D1F4-F699-4571-882A-820D0DD32BBC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D7EF7EE-2F54-4B8A-8EC7-FC679CE31643" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "319413D8-6F01-4B59-88C9-918BD717855C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4A4BF90-0EC0-455B-A18A-D987D2028309" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj28a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C5073347-11EF-4DEC-B439-390DF94B6097" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj29a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75C51327-9CD1-4223-9E9A-8E057EC6AC3C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_3sj30a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F9B26F7-334F-4832-8ACE-EC719C97CF04" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_5qk09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BB65164-1BB9-4371-8944-7BA53103EAFC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_e826z_5qk13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FF2D22F-1290-4FBE-AF2A-C32F5B4184CD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_m527z_f2a79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57012B50-9F56-4FC7-B888-14F5CF340232" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_flow_mfp_m527z_f2a80a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D022D3D-E32D-4A4D-8ABF-54800E9BC761" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_m506_f2a66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "671CFEE8-FAC5-4CDC-82F2-8E4E9D8CF7B9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_m506_f2a67a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D52A63F-AAC6-480F-902E-5FACAB854468" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_m506_f2a68a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C1FCF2A2-7684-4755-AA04-32BF764DDDFA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_m506_f2a69a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "396CB141-B468-45CA-94D1-1138F3226978" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_m506_f2a70a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E5710A92-741B-45A2-A514-712A08552A28" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_m506_f2a71a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D46C653-5B5F-4CDF-BA00-0D129B4EC6E8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e42540_3pz75a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B9B8A7B-79F3-47CD-9B02-9D729CFA9F7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e52545_3gy19a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF59A724-EC42-4290-BD97-96559EDCB6CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e52545_3gy20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F48B97-CF54-4666-A162-484FB11D7C1E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e52645_1ps54a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA95EB76-176A-4C09-BB88-7EF39F0FF93D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e52645_1ps55a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A6161B4-F9AB-49F5-AFB9-17E05A0945CC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62555_j8j66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53C45ACE-BD7A-475F-AD1E-05F3BDA06A4A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62555_j8j67a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6EDA9AE6-4113-455C-9DF7-98630C5303E0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62555_j8j73a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F82AF0F8-81FD-4468-8E10-3152D5B62237" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62555_j8j74a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FD1CC08-23F6-4892-978A-A7515BC598B5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62555_j8j79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D03DC56E-519A-4FFD-8EC4-60462FD3281E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62555_j8j80a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29962D63-B50E-4D91-BC89-7CCE4338276B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62565_j8j66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE246896-4095-4E9E-9FA6-5D14A64AD8A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62565_j8j67a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F88DDA1-F201-41E2-8E01-0B153DC01ADF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62565_j8j73a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5B0BAA2-BD17-46FD-8BF8-DDD081FF4535" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62565_j8j74a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6A92332-DCBF-46BA-BCA4-F25410B58151" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62565_j8j79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "38075068-43D8-4FE1-9270-6D8745B9F2ED" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62565_j8j80a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C482D6A3-8E36-4C81-A615-F89467F50FA9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62655_3gy14a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C1F02E8-080C-447F-8BCD-03566F2C204B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62655_3gy15a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71D1E903-2948-4B7E-9F79-F297D3661799" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62655_3gy16a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40E0893E-5343-408F-862E-D199FAC3CA0A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62655_3gy17a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5EE149ED-92BF-461B-81E6-ABF1BC3BC9D9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62655_3gy18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45B9D17F-BCE9-4A33-AE98-8E4BEAD1356F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62665_3gy14a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B7EF9C3-38B6-44BC-88BC-83F41EB8589A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62665_3gy15a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E492FB6-65E6-49A2-888E-4D30E7C82262" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62665_3gy16a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "000DE6E9-72BB-47F3-9C2B-D9B6362DB068" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62665_3gy17a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A78E48CF-2FC0-4405-9170-12EF7A535AF7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e62665_3gy18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41E66862-8A64-4176-88B1-0BC5DB1410D7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72425_5cm68a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35A51634-48A4-4B6B-8CD5-E9851A63376A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72425_5cm69a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C14761D-3D66-4072-9DEE-C033A6A68A71" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72425_5cm70a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "183ED341-68A1-4703-8590-1890A19383D1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72425_5cm71a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6EE9DB4A-C730-4AAA-BD60-0874D382185B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72425_5cm72a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ED98FB1-3960-4A3D-B5CA-4C835C18162A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72425_5rc89a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD27492-2921-4A18-B0BD-48618416B6D0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72425_5rc90a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1D06BB8-7F84-4DAA-860A-59FD87020D91" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72430_5cm68a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D9996B9-EAC2-434D-99C3-E05E449F0E2D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72430_5cm69a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "478395BB-264F-4306-BEA4-97A6F661E938" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72430_5cm70a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C484B4B-6CE6-4193-A14F-FB667C2EADB2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72430_5cm71a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FC0F2BE-B6F7-44E5-85DB-4C72F9C34EA5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72430_5cm72a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8E606BE-3C7D-4E49-8402-76BF17EEAED4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72430_5rc89a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95FD37F3-3A8B-40DD-810C-C293ECED3399" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72430_5rc90a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03C0A182-40F6-4EC2-AA9A-204BDF446F8D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72525_x3a59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D7CDE48-5CB8-4D4F-A136-1F321EC2B38D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72525_x3a60a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91420CF7-C90E-4207-B3B9-56001F7BA7BE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72525_x3a62a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AACCBFC-8A28-4A66-AABE-AF4276023830" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72525_x3a63a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7A5F9C7-ED8D-41A4-80BC-D04425EF1C94" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72525_x3a65a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B77BBD8-EAED-442F-AFFF-6622D8E612FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72525_x3a66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5FE3664-D6E3-4510-84D1-BADC1146A2C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72525_z8z010a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20B25D52-675B-40E7-97CD-BF421F5FF331" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72525_z8z011a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF57DF52-AF1E-43E1-80CF-725D06FEAD4E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72525_z8z06a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3164F66D-EC5C-443E-8926-1CEA42CC5213" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72525_z8z07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECB9D683-2CBC-4195-AE8E-19C17BA0FF24" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72525_z8z08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C91FD9DC-EA77-4024-BE69-DC892B37501E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72525_z8z09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62CA2EA3-5D63-4612-BE2F-18B51E0C7819" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72530_x3a59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB2427BC-F30D-46AC-8DB1-84D31F1D2754" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72530_x3a60a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E9C439B-9C7D-452F-81A8-07380BE72480" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72530_x3a62a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFC5E039-7B0C-4A65-A5E9-2FB02C12C286" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72530_x3a63a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9391382A-2BC0-485E-BDBB-162000B8C4FD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72530_x3a65a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4AA75A-D264-49E4-9C8B-93C9255BD4C6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72530_x3a66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5FE9E6C-77E2-417B-90E8-B05DAD8DE5DD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72530_z8z010a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59785137-91E3-4600-9070-007422BF28C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72530_z8z011a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13B93319-55DA-42A7-B49C-25DF31BEA111" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72530_z8z06a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "963718D1-7A1A-49D1-ADAF-A79970239C8E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72530_z8z07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36A6908B-787E-42D8-A42F-194426BB8FC3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72530_z8z08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1058716-BA05-470A-BF22-8600653E9E31" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72530_z8z09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05401FC6-B2C8-425E-BDC7-C8F45D305BEA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72535_x3a59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FBD8CD8-A56F-4F3A-8717-86697AA28A68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72535_x3a60a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "106FDCE0-9ABE-4D0C-B161-4A6D86545E5B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72535_x3a62a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E86EF00-46B8-4BC3-A12F-5F98120BEA0F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72535_x3a63a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19E90F5D-175A-403B-95A6-8154E86F6281" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72535_x3a65a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C142161F-B89E-4AD0-A1FD-38DC6E14C87D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72535_x3a66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D033FD20-3783-46BA-A5D8-8E0A27D42AD7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72535_z8z010a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DAB64505-7AD1-409F-9AF9-7A69B918F87D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72535_z8z011a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1E896DE-AAB3-4A40-BD4A-EFA99B0CFD47" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72535_z8z06a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01240607-8A18-4DAF-AEE6-D3CB46B8C4BE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72535_z8z07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB2FC156-B0F3-4F5C-8BC7-97511B255CA2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72535_z8z08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7068B137-349B-4F5B-B48A-540EEDA6345D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e72535_z8z09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEA62558-FD88-4DF8-A943-2C38768D9DEC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e730_3sj03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BCB97220-0C8B-4E14-ACEC-D3C16CCE17DE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e730_3sj04a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB9A8DA-24FA-4B30-A162-26356AA0B0C7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e730_5qj87a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B56AB16C-3822-4774-A828-533692B9769F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73025_3sj03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18A2DBDB-D1D9-4C4B-82DA-CF6C9E977202" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73025_3sj04a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFD0B644-67A9-40FF-9ABE-0B819596A3FD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73025_5qj87a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFB2A32A-DB34-4CF4-93F7-6AF127CD4AB9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73030_3sj03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0243954C-042F-43F7-8033-CB030DD87435" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73030_3sj04a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6251675-3F8A-41F0-A464-0986A81005AE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73030_5qj87a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE9462D2-DBCF-48C3-BB11-A15C1A387E49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e731_3sj00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FA65825-4248-419B-A750-1F77705068AC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e731_3sj01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBE099A7-2234-4F3C-A37E-C9A01777E35A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e731_3sj02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA1703D-25F6-4B14-ACF7-7C13F7938B1D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e731_5qj98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C1546CF-F662-4388-8AA4-4E8BC0C659FB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e731_5qk02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81172F44-6F64-4587-943E-28ABF698A30C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e731_6bs57a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75312CC5-8127-4F12-9066-FA4B059AEC07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e731_6bs58a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3ED17DDF-DDE8-47C0-B212-532F89A9ACFF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e731_6bs59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DADED2C-96DE-45AA-9B4E-BEFBB1F26C73" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73130_3sj00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9467D4C1-A42B-4C4F-AB5B-B7BCED197F1B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73130_3sj01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "740BCBA4-6897-4E5A-B446-51D9BC76878F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73130_3sj02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FFB72AE-86BC-405B-8703-58703A92AEA6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73130_5qj98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A29E3814-95AD-4A4D-BC03-ABBC8078D0F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73130_5qk02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "31A3016B-04E7-4B9F-B10F-5E59661255D9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73130_6bs57a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "38B4F81E-4659-4115-922D-968C44E6D5AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73130_6bs58a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A57F195-C5E9-40FE-84ED-2BCA5C20DB83" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73130_6bs59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E9983DC-9AC7-46D1-9B27-E4C6F89B28B4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73135_3sj00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "38B57D68-53B6-4893-88F0-0C211455247C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73135_3sj01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C846304-C001-4CD8-8C7A-F81A956D8C5C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73135_3sj02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3ED1041E-1B33-4489-A906-A6C71179A7B0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73135_5qj98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A933778-FCD0-4397-8526-F368D88E3FFC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73135_5qk02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0CFA194-CB21-4265-9A65-50A0B0A75D6A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73135_6bs57a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78BBCC67-6977-4BA9-9046-73B21D0ABCAE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73135_6bs58a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "161B2378-CABF-4CDE-A0D1-A8AD76C1AA08" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73135_6bs59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC15C9CD-AD2D-4921-AA15-DB435D95165C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73140_3sj00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08E5D955-9598-4983-8654-9C7985E68BB4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73140_3sj01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1784ECEA-7BB0-40D2-B0E0-FE3C69376EFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73140_3sj02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9AB27E6A-2A47-4BD9-89B2-C53AA066F37C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73140_5qj98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33DB03DB-E1F3-4FBE-AA5A-D4BE84672C32" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73140_5qk02a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98C2AFAA-A1AE-44AA-AD11-DD5FCAB5026F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73140_6bs57a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C8C3A11-10B7-4EA4-A039-A303AEE84E70" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73140_6bs58a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D9538E5-6608-436C-A405-96E5E59FAFDC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e73140_6bs59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72A22FE4-E140-4BD7-933B-C6A61DDC476C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540_az8z20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "860C6C17-4CC4-46EF-B899-14AA2DF04CE7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540_x3a68a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17B6AD98-912A-4F2D-A1A6-C9A26D52B4B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540_x3a69a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "594DFA69-A3FF-4EF6-B9F3-E2914EC9CE89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540_x3a71a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88F11428-9984-4CAE-99E5-CC77B07B4FC8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540_x3a72a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C75A5246-D76B-4AA1-9E25-A22183F7DF9F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540_x3a74a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5144101F-7C96-4CAD-B236-09D2EE0EE0D2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540_x3a75a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0695DA5A-5B1F-491B-9E27-5E26C9BD0367" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540_x3a79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0ECB855-9290-4E74-A3E5-A5DD8DDBAA25" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540_x3a82a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C6F0557-3874-4E76-ABE3-84E173BB6C72" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540_z8z18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07D591E7-F74E-45EE-930C-9AFB7C9C7384" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540_z8z19:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4828A590-1CD9-4AEA-A4D1-2F84B3121854" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540_z8z22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98568C37-0115-4376-89DA-21FE3582446F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540_z8z23a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12C76D0B-F6C7-48D6-8C1A-E207CBEC44DE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540du_5cm58a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2B4185E-F80C-4973-A77C-615E93CE4FED" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540du_5cm59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8E95EE9-703D-4321-B4F3-9BE3E9092D2A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540du_5cm61a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B047FFF-BB16-4E5C-9BFD-0B10AE30507F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540du_5fm76a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18869BA6-ECCA-4323-BCB7-F58D5C8A2611" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540du_5fm77a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2876AB4-C798-432A-A87C-988F21EE1864" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540du_5fm78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2C98065-5DB7-430B-A021-0BA6C3728D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540du_5rc83a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "864CEFF8-B024-4762-869E-CA7D8EEBDE63" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540du_5rc84a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66D4DCC9-99CE-47AF-8C7E-630180DF9BD0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82540du_5rc85a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AD3D238-740A-4BC5-A703-2C22B214ED89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550_az8z20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17D4BB0F-AC03-48A3-8220-B56155599D3B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550_x3a68a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDC858A4-DCA8-4A78-B406-9BE1DBD87EA5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550_x3a69a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A15BB99A-59CB-46C6-BD59-32966378D9CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550_x3a71a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00FC5141-412E-44CE-AB3B-F49997A0508F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550_x3a72a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B76AC6-9CF3-4AA5-9C47-CDACE55BDD74" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550_x3a74a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E97411E-B8FE-4D2C-911F-01119B3FC760" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550_x3a75a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "121E32B6-D150-460F-87A6-491A08BC08BA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550_x3a79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A26B96AA-CCFA-4514-A13A-933C45305BEC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550_x3a82a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73FC1B10-6187-4CD0-9A19-803939876C62" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550_z8z18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1744C1E9-49E7-45A9-83A8-118C6E0D2723" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550_z8z19:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF318D18-DDCE-454F-9A9A-32153E28BF74" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550_z8z22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "31A8274F-5BB4-4896-8318-D5C3DE730C0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550_z8z23a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8E3315A-0282-4B3B-BD5C-AEEE4B2EAD81" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550du_5cm58a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29DA99D4-72B3-4E39-AEBE-B8E879A087F8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550du_5cm59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6C55E60-A1ED-4145-B7F0-024F8B8B9419" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550du_5cm61a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6789BC71-820B-4ACA-8750-7CB86D3E6F01" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550du_5fm76a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12259580-0578-4443-901C-D1DD721F8050" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550du_5fm77a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9566F1A3-91B7-43E3-8156-C78BE4F7CECD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550du_5fm78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D7DBF337-297E-4A5F-B9D3-DD08F81AB641" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550du_5rc83a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6449822-9D45-4F80-A91D-ED1AB8C78D86" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550du_5rc84a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0FFD130-ED5D-44B3-A320-C171E1F2FCB9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82550du_5rc85a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46D5DF72-75F1-4033-9C55-0E025BD2488C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560_az8z20a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9D8F542-29B3-4369-B496-D020BCE95554" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560_x3a68a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76AC2F61-3EBF-4592-B9D6-26E384BE253C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560_x3a69a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B16944E6-2ABF-4D2D-BBDE-A3FEECE29F44" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560_x3a71a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE66ACD-3713-437F-BA5B-A638103DDC3A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560_x3a72a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F6B6B0A-3207-4049-BE2D-177DE9B460CE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560_x3a74a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C1A627E6-2658-4E11-845D-FDBB2E6B059B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560_x3a75a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85BEC89E-AF66-471A-BB1A-910E3D6BBE04" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560_x3a79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D6F2C4A-D343-4162-8F6D-F733D6248525" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560_x3a82a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DEA6C9C-C0A7-49E9-98E7-B64D6B774B1D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560_z8z18a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "10D36617-7DA3-43B8-8AC5-81F42760CA7E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560_z8z19:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD2E1EA8-345B-4434-9AC6-A0B7070E66E0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560_z8z22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76EEC929-B4A5-44B4-AD56-D374B3258EC5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560_z8z23a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CBCDFD-2695-498C-8680-A69CE92235C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560du_5cm58a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95BA8FDD-0B98-4205-A0A8-19B492E68A87" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560du_5cm59a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F023575-088F-4FFF-A5E5-41E9636A773D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560du_5cm61a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6221100E-DC1D-43A5-AAB0-2D9526E45D40" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560du_5fm76a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEA6BD8B-60A6-4270-A8CD-FD99F5DF49DB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560du_5fm77a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0488CE9-69DB-4BEA-96D8-8BF0F28F9F3D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560du_5fm78a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAB89E95-883C-4B21-91B0-C0EEA49F7615" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560du_5rc83a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5BCFE1A-3A4D-4329-AF19-D98D1088A92A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560du_5rc84a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59FCDDCD-A784-4459-94BA-268378A4D5E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e82560du_5rc85a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A718F1E6-32DA-4D98-A912-E7E823111BF8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C970F21B-71D7-41C9-B9D7-D8DC0EF5E05C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D1E94D5-B1AC-4B1C-BB59-4AD4F09A55F4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F305AFEF-33E1-4530-880F-90223903C393" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj28a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C7C9368-088B-4D79-81BB-5A987C486490" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj29a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D98082D7-7404-4192-AD61-84434A2146DB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_3sj30a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821EDF92-DBAB-4656-97D6-F06F10C8D635" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_5qk09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7950EB50-BF74-4721-AA76-F40A010773D4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_e826dn_5qk13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32BA9E78-13F6-470C-AE0D-5B68FF658428" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_m527_f2a79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53C32A87-73F4-46FB-8BB6-23735073FA37" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_managed_mfp_m527_f2a80a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65F70CEB-E7A1-4485-9728-C49527D93FA7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_color_755_4pz47a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8DF05-CDCF-457E-90CC-B5D170062F49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_color_mfp_774_4pa44a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8F74027C-8D4D-4027-860D-549E46F2CA95" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_color_mfp_774_4pz43a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B7F9517-7A52-454B-9668-3DA3B6D3F079" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_color_mfp_779_4pz45a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7194F6F8-845A-4015-8DB9-7FCE63150965" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_color_mfp_779_4pz46a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB74B728-E8E6-4AE2-9F30-B639C49C8F58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_556_g1w46a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D54EBAA-F4F1-4F5A-A629-81C0EE2FAB1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_556_g1w46v:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E06F51CE-C4A6-4153-9E84-0E69D7180C40" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_556_g1w47a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "160FF5D3-0506-4169-AA62-94E1BB40CCEB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_556_g1w47v:-:*:*:*:*:*:*:*", + "matchCriteriaId": "928C6BEC-6A58-4B31-9C3F-8AE6687E6A22" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_765_j7z04a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8B27060-38CC-4F25-B504-C62CE6BE4EA6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_flow_mfp_586z_g1w39a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D897684F-7BEA-463A-83E8-D636FC1AC826" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_flow_mfp_586z_g1w40a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D2DE4EEA-68C3-4257-B750-F63269AB5B44" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_flow_mfp_586z_g1w41a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D92718E0-B362-420D-BAE7-BD1F562A9D48" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_flow_mfp_780f_j7z09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77717CB6-483E-49AF-A763-1B9DC318646A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_flow_mfp_780f_j7z10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "383A703C-5CEB-4AE0-BBA1-A8ACC8A3FAC3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_flow_mfp_785_j7z11a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C07B2F1E-BCC6-40AD-AF9E-7F59E1A294A7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_flow_mfp_785_j7z12a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "363A2FFD-7C8D-4AF6-8A89-2F587B301FF4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_mfp_586_g1w39a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A89084F-F256-49A5-9C66-BA6E98E5E4C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_mfp_586_g1w40a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0BE019D-47F1-46FC-815B-1F4C64F9C98C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_mfp_586_g1w41a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CC6765F-2DB2-44AA-A802-42695A0F26B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_mfp_780_j7z09a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1D7E37D-24B2-4554-B937-C3B5BF984A0A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_enterprise_color_mfp_780_j7z10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B06466AC-031A-4137-AEAA-2436C5215545" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_e55650_l3u44a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5139C1D3-42B6-44E6-8E69-2762E2242407" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_e75160_j7z06a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E741B063-C3C5-4897-A23A-B47CE82E8B11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e58650z_l3u42a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4857BCD6-1AD6-4D43-8B69-84FD2B648251" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e58650z_l3u43a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5389755-4EA3-4D89-AF81-4F8E30DA8FEF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e77650z_j7z03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2709AB6B-7C7F-4584-B6CD-9B06A6F66303" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e77650z_j7z05a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3A97923-11F6-41C3-9C2B-BE1AD73AB318" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e77650z_j7z07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7158858E-5B0B-4309-86DC-3E4657F5DB4E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e77650z_j7z08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78E83AE7-67F0-4F52-9D1F-7DEF3A9253A9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e77650z_j7z13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "893CFC82-ED78-480C-9D78-188A648969B2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e77650z_j7z14a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "946C42F6-058D-4028-A186-0DC4CC6E7298" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e77650z_z5g77a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA604D1D-1FDC-41A6-90BF-C8A8FA01559F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e77650z_z5g79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E1F9062-DD19-432E-9E1B-C2E15D6B77EA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e77660z_j7z03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06A1B7D4-F215-4265-B7B9-16BDB2ECBBE0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e77660z_j7z05a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F81F396D-A6E9-41C9-B510-A0D9B977B862" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e77660z_j7z07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CBCF997-C3C3-4556-825B-B68EA9ED7B39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e77660z_j7z08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84475D62-686A-4303-8906-FC285764444A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e77660z_j7z13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9EF67FAE-7065-49AD-B214-A9A567984695" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e77660z_j7z14a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65160917-4C1F-4961-A976-47FC9ACB3429" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e77660z_z5g77a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1284F4E-D0B4-460D-8E52-E12B4D285BCF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_flow_mfp_e77660z_z5g79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0757640-052A-43FE-B099-D345D4DE28F9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_e58650dn_l3u42a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "30198265-497B-49A0-8D20-7479747F4844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_e58650dn_l3u43a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C9291E8-3FEA-4C86-B74E-D1A66422B13F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_e77650_j7z03a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BD72A8D-27EC-43CE-A34A-18CD60E91B00" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_e77650_j7z05a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B118E1F-FFA2-4DD5-B798-5D36C64C35B2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_e77650_j7z07a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB2BD4CE-0C9B-4476-9E0B-ECE1ACF567AC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_e77650_j7z08a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C74EEE9D-CFFF-4199-8F1B-7F60400554D9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_e77650_j7z13a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB117AD-560C-4577-9C06-7F696F10C169" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_e77650_j7z14a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6484A33-F71B-4225-84B5-24FA5C6104C6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_e77650_z5g77a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "464FBD60-C81B-4FD5-BDE7-3551E010678F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_e77650_z5g79a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "988BC6F8-6817-45A0-A144-2AFBAA99D9A9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77440_y3z60a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73F00C8B-DFBC-493A-A17D-EFBE8130559D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77940_2gp22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA3FB4EF-3549-40CB-A07B-872940164A20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77940_2gp23a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC88B5F0-B028-48F0-BB98-C5F02CC3D34A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77940_2gp25a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E17EF983-CB0A-456F-8602-FFCDA0BC672B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77940_2gp26a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57E2C9D1-37A2-4CFA-9B39-B7AAF319052C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77940_5zn98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE76E4D2-4938-41DE-9DB3-65A9566F36AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77940_5zn99a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "983A83F9-F880-4406-8337-D44D020DB50D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77940_5zp00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C1DC3A53-0613-4591-BDAE-FFBE9D251172" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77940_5zp01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "30B07729-5D31-4D00-84ED-7DE16A7C1A6A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77940_y3z61a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "64963144-760D-4DD1-B256-AF14C15D3770" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77940_y3z62a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2DC94055-024E-4019-B79C-6AC77177CDE5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77940_y3z63a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15E755F3-4354-471E-A5A9-508BBAA37D1E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77940_y3z64a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B600A19-63E9-4533-BD65-272F7BED937F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77940_y3z65a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA257A34-8810-40AB-9607-AD76B96A854B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77940_y3z66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C46590E-79E4-4597-BD6F-4282BD504DC1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77940_y3z68a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF2F0950-B352-47AE-9CFA-ED400DC6DC26" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77950_2gp22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F887111-0060-4546-BFA8-79EF4FAA22AE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77950_2gp23a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "672382C4-7F03-4DB4-BC00-62E1FE111628" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77950_2gp25a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C461D841-C50D-4315-82FE-D38A4C6EFF80" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77950_2gp26a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E4489B-80AE-46EF-8667-BA8F92FC3416" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77950_5zn98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25E1935F-7AC9-451C-BA11-B573D5FAA94F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77950_5zn99a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C91BBBD-057E-45D7-8A0D-29BEB3345E85" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77950_5zp00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FAE7795-D1B1-4ECF-930B-4EDBC44B24BA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77950_5zp01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8072007F-E23C-4499-84AD-03FAAF7B1286" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77950_y3z61a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D2F40A48-DE54-4E7F-A721-8399A9DC538C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77950_y3z62a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "531DCC54-FC4D-4B04-B522-C2DC3243C973" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77950_y3z63a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F0EBBF5-FD09-410B-AC42-4758DAFD7300" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77950_y3z64a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94B87DD9-3B83-479E-8074-C7079C3E8A32" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77950_y3z65a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8E1BFF1-71CE-4327-B8DF-A60CC95BC0BA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77950_y3z66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0819E6C-1052-48B2-8BAA-5FE95274F007" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77950_y3z68a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17FBDB26-293E-4F87-A0DD-B31E157B5C15" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77960_2gp22a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE4BB7AB-FFED-4396-BBEA-0ABB3E7D4F74" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77960_2gp23a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC2EC2BB-5806-4B90-BE36-9085237B9BE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77960_2gp25a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A4CBAB2-20C2-4EE1-A637-894EE66B4CFE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77960_2gp26a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02FB2065-DDBA-47B5-A8E0-02F4A7D3367D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77960_5zn98a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "774A65DB-E929-41B7-8E0F-E79A4BA0EFD9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77960_5zn99a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD3EA7B0-6B3A-4ACD-9296-F7FFB5D9B510" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77960_5zp00a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDC401CC-8042-48F6-8FAE-B5858A7FD966" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77960_5zp01a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A75F81A8-3F50-47D7-88FD-F7BB0299D7EC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77960_y3z61a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FEFC0353-4C09-4BD6-A0EA-4EDB6D220FE5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77960_y3z62a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B888DCE2-ACB4-4358-9EC2-A0F996F22B3E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77960_y3z63a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9A76A28-1381-4974-A2E4-0F8DC19C841E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77960_y3z64a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57B5EE38-43F7-4F5D-8C4F-624FCB3DBE10" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77960_y3z65a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2467EB0A-4287-4265-B99E-251398464ADD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77960_y3z66a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3134163F-F665-4E88-A5B5-1A00798DE22F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_mfp_p77960_y3z68a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB839DA-83C8-429F-BD13-6950EEAFB2C6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:pagewide_managed_color_p75250_y3z49a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E63B3DE8-61B7-4DAF-AAB4-789CF13A308F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:scanjet_enterprise_flow_n9120_fn2_l2763a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B31B3B8F-6964-4EF6-AD1A-F59BAEA573FD" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.hp.com/us-en/document/ish_9365285-9365309-16", - "source": "hp-security-alert@hp.com" + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5197.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5197.json index fe97373e96e..c42691d83d9 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5197.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5197.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5197", "sourceIdentifier": "cve-coordination@google.com", "published": "2023-09-27T15:19:43.110", - "lastModified": "2023-10-02T20:21:40.120", + "lastModified": "2023-10-11T16:23:47.707", "vulnStatus": "Analyzed", "descriptions": [ { @@ -21,20 +21,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "baseScore": 6.6, + "baseSeverity": "MEDIUM" }, "exploitabilityScore": 1.8, - "impactScore": 5.9 + "impactScore": 4.7 }, { "source": "cve-coordination@google.com", diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5201.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5201.json index 30762656ebc..065c32905c8 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5201.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5201.json @@ -2,19 +2,43 @@ "id": "CVE-2023-5201", "sourceIdentifier": "security@wordfence.com", "published": "2023-09-30T03:15:09.547", - "lastModified": "2023-09-30T03:16:35.133", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T16:32:31.463", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The OpenHook plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.3.0 via the 'php' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to execute code on the server. This requires the [php] shortcode setting to be enabled on the vulnerable site." + }, + { + "lang": "es", + "value": "El complemento OpenHook para WordPress es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo en versiones hasta la 4.3.0 incluida a trav\u00e9s del c\u00f3digo corto 'php'. Esto permite a atacantes autenticados con permisos de nivel de suscriptor o superiores ejecutar c\u00f3digo en el servidor. Esto requiere que la configuraci\u00f3n del c\u00f3digo corto [php] est\u00e9 habilitada en el sitio vulnerable." } ], "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", @@ -46,18 +70,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rickbeckman:openhook:*:*:*:*:wordpress:*:*:*", + "versionEndIncluding": "4.3.0", + "matchCriteriaId": "668B9B94-B097-494D-8BE0-C549ABF7F1A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/thesis-openhook/tags/4.3.0/inc/shortcodes.php#L28", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/thesis-openhook/tags/4.3.1/inc/shortcodes.php?rev=2972840#L24", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/37b9ed0e-5af2-47c1-b2da-8d103e4c31bf?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5262.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5262.json index a390de5a0f5..ea99d11003d 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5262.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5262.json @@ -2,15 +2,41 @@ "id": "CVE-2023-5262", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-29T14:15:11.163", - "lastModified": "2023-09-29T15:52:15.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T16:53:44.180", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in OpenRapid RapidCMS 1.3.1 and classified as critical. Affected by this vulnerability is the function isImg of the file /admin/config/uploadicon.php. The manipulation of the argument fileName leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240871." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en OpenRapid RapidCMS 1.3.1 y clasificada como cr\u00edtica. La funci\u00f3n isImg del archivo /admin/config/uploadicon.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento fileName conduce a una carga sin restricciones. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-240871." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,22 +97,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/OpenRapid/rapidcms/issues/10", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/yhy217/rapidcms-vul/issues/5", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.240871", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.240871", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5264.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5264.json index 05b0e872718..4f2bd595e6e 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5264.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5264.json @@ -2,15 +2,41 @@ "id": "CVE-2023-5264", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-29T15:15:10.593", - "lastModified": "2023-09-29T15:52:15.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T16:35:24.257", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in huakecms 3.0. Affected by this vulnerability is an unknown functionality of the file /admin/cms_content.php. The manipulation of the argument cid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240877 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en huakecms 3.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/cms_content.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento cid conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-240877." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,18 +97,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:huakecms:huakecms:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1D98A81C-D83A-4D86-A716-75094FFDED7A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/yhy217/huakecms-vul/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.240877", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.240877", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5266.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5266.json index 89ed1014143..1b2ff14d5a1 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5266.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5266.json @@ -2,15 +2,41 @@ "id": "CVE-2023-5266", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-29T15:15:10.750", - "lastModified": "2023-09-29T15:52:15.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:23:59.347", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in DedeBIZ 6.2. This affects an unknown part of the file /src/admin/tags_main.php. The manipulation of the argument ids leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240879." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en DedeBIZ 6.2 y clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo /src/admin/tags_main.php. La manipulaci\u00f3n de los identificadores de argumentos conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-240879." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,22 +97,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedebiz:dedebiz:6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4240B26E-641D-4E8C-8001-B86FA8388C57" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/yhy217/dedebiz--vul/blob/main/time_injection.zip", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/yhy217/dedebiz--vul/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.240879", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.240879", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5268.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5268.json index fb9997ce4d5..803971c9932 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5268.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5268.json @@ -2,15 +2,41 @@ "id": "CVE-2023-5268", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-29T16:15:10.617", - "lastModified": "2023-09-29T17:27:25.983", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T17:24:17.227", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in DedeBIZ 6.2 and classified as critical. This issue affects some unknown processing of the file /src/admin/makehtml_taglist_action.php. The manipulation of the argument mktime leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240881 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en DedeBIZ 6.2 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo /src/admin/makehtml_taglist_action.php. La manipulaci\u00f3n del argumento mktime conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-240881." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,18 +97,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedebiz:dedebiz:6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4240B26E-641D-4E8C-8001-B86FA8388C57" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/yhy217/dedebiz--vul/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.240881", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.240881", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5295.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5295.json index 758eb9b4b01..2de945b3f3a 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5295.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5295.json @@ -2,19 +2,43 @@ "id": "CVE-2023-5295", "sourceIdentifier": "security@wordfence.com", "published": "2023-09-30T03:15:09.710", - "lastModified": "2023-09-30T03:16:35.133", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T16:33:05.667", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Blog Filter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'vivafbcomment' shortcode in versions up to, and including, 1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Blog Filter para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto 'vivafbcomment' en versiones hasta la 1.4 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -46,14 +70,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:awplife:blog_filter:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.4", + "matchCriteriaId": "234C9CF2-B421-4FE7-B63A-E30553F63B58" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/facebook-comment-by-vivacity/tags/1.4/user-file.php#L172", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/602b3b9c-76a7-4b0b-8aad-e554c2fd6910?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 6657e58eddd..6c4f9a43e37 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-10-11T16:00:24.797103+00:00 +2023-10-11T18:00:25.476971+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-10-11T15:28:21.907000+00:00 +2023-10-11T17:54:51.067000+00:00 ``` ### Last Data Feed Release @@ -29,46 +29,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -227564 +227584 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `20` -* [CVE-2023-45396](CVE-2023/CVE-2023-453xx/CVE-2023-45396.json) (`2023-10-11T14:15:09.993`) -* [CVE-2023-4957](CVE-2023/CVE-2023-49xx/CVE-2023-4957.json) (`2023-10-11T14:15:10.047`) +* [CVE-2023-24479](CVE-2023/CVE-2023-244xx/CVE-2023-24479.json) (`2023-10-11T16:15:12.640`) +* [CVE-2023-27380](CVE-2023/CVE-2023-273xx/CVE-2023-27380.json) (`2023-10-11T16:15:12.747`) +* [CVE-2023-28381](CVE-2023/CVE-2023-283xx/CVE-2023-28381.json) (`2023-10-11T16:15:12.827`) +* [CVE-2023-31272](CVE-2023/CVE-2023-312xx/CVE-2023-31272.json) (`2023-10-11T16:15:12.913`) +* [CVE-2023-32632](CVE-2023/CVE-2023-326xx/CVE-2023-32632.json) (`2023-10-11T16:15:12.997`) +* [CVE-2023-32645](CVE-2023/CVE-2023-326xx/CVE-2023-32645.json) (`2023-10-11T16:15:13.073`) +* [CVE-2023-34346](CVE-2023/CVE-2023-343xx/CVE-2023-34346.json) (`2023-10-11T16:15:13.157`) +* [CVE-2023-34354](CVE-2023/CVE-2023-343xx/CVE-2023-34354.json) (`2023-10-11T16:15:13.233`) +* [CVE-2023-34356](CVE-2023/CVE-2023-343xx/CVE-2023-34356.json) (`2023-10-11T16:15:13.320`) +* [CVE-2023-34365](CVE-2023/CVE-2023-343xx/CVE-2023-34365.json) (`2023-10-11T16:15:13.400`) +* [CVE-2023-34426](CVE-2023/CVE-2023-344xx/CVE-2023-34426.json) (`2023-10-11T16:15:13.487`) +* [CVE-2023-35055](CVE-2023/CVE-2023-350xx/CVE-2023-35055.json) (`2023-10-11T16:15:13.567`) +* [CVE-2023-35056](CVE-2023/CVE-2023-350xx/CVE-2023-35056.json) (`2023-10-11T16:15:13.643`) +* [CVE-2023-35193](CVE-2023/CVE-2023-351xx/CVE-2023-35193.json) (`2023-10-11T16:15:13.723`) +* [CVE-2023-35194](CVE-2023/CVE-2023-351xx/CVE-2023-35194.json) (`2023-10-11T16:15:13.797`) +* [CVE-2023-35965](CVE-2023/CVE-2023-359xx/CVE-2023-35965.json) (`2023-10-11T16:15:13.883`) +* [CVE-2023-35966](CVE-2023/CVE-2023-359xx/CVE-2023-35966.json) (`2023-10-11T16:15:13.970`) +* [CVE-2023-35967](CVE-2023/CVE-2023-359xx/CVE-2023-35967.json) (`2023-10-11T16:15:14.050`) +* [CVE-2023-35968](CVE-2023/CVE-2023-359xx/CVE-2023-35968.json) (`2023-10-11T16:15:14.123`) +* [CVE-2023-4936](CVE-2023/CVE-2023-49xx/CVE-2023-4936.json) (`2023-10-11T17:15:11.117`) ### CVEs modified in the last Commit -Recently modified CVEs: `41` +Recently modified CVEs: `60` -* [CVE-2022-27665](CVE-2022/CVE-2022-276xx/CVE-2022-27665.json) (`2023-10-11T14:45:44.747`) -* [CVE-2022-4864](CVE-2022/CVE-2022-48xx/CVE-2022-4864.json) (`2023-10-11T15:24:48.003`) -* [CVE-2022-25852](CVE-2022/CVE-2022-258xx/CVE-2022-25852.json) (`2023-10-11T15:27:34.157`) -* [CVE-2023-34986](CVE-2023/CVE-2023-349xx/CVE-2023-34986.json) (`2023-10-11T14:01:04.407`) -* [CVE-2023-5233](CVE-2023/CVE-2023-52xx/CVE-2023-5233.json) (`2023-10-11T14:10:16.687`) -* [CVE-2023-37538](CVE-2023/CVE-2023-375xx/CVE-2023-37538.json) (`2023-10-11T14:23:06.207`) -* [CVE-2023-44105](CVE-2023/CVE-2023-441xx/CVE-2023-44105.json) (`2023-10-11T14:23:06.207`) -* [CVE-2023-44107](CVE-2023/CVE-2023-441xx/CVE-2023-44107.json) (`2023-10-11T14:23:06.207`) -* [CVE-2023-44108](CVE-2023/CVE-2023-441xx/CVE-2023-44108.json) (`2023-10-11T14:23:06.207`) -* [CVE-2023-44114](CVE-2023/CVE-2023-441xx/CVE-2023-44114.json) (`2023-10-11T14:23:06.207`) -* [CVE-2023-44116](CVE-2023/CVE-2023-441xx/CVE-2023-44116.json) (`2023-10-11T14:23:06.207`) -* [CVE-2023-44118](CVE-2023/CVE-2023-441xx/CVE-2023-44118.json) (`2023-10-11T14:23:06.207`) -* [CVE-2023-44119](CVE-2023/CVE-2023-441xx/CVE-2023-44119.json) (`2023-10-11T14:23:06.207`) -* [CVE-2023-34985](CVE-2023/CVE-2023-349xx/CVE-2023-34985.json) (`2023-10-11T14:28:07.943`) -* [CVE-2023-34987](CVE-2023/CVE-2023-349xx/CVE-2023-34987.json) (`2023-10-11T14:28:16.647`) -* [CVE-2023-34988](CVE-2023/CVE-2023-349xx/CVE-2023-34988.json) (`2023-10-11T14:28:24.797`) -* [CVE-2023-34989](CVE-2023/CVE-2023-349xx/CVE-2023-34989.json) (`2023-10-11T14:28:40.233`) -* [CVE-2023-34993](CVE-2023/CVE-2023-349xx/CVE-2023-34993.json) (`2023-10-11T14:29:10.010`) -* [CVE-2023-36547](CVE-2023/CVE-2023-365xx/CVE-2023-36547.json) (`2023-10-11T14:29:22.937`) -* [CVE-2023-36548](CVE-2023/CVE-2023-365xx/CVE-2023-36548.json) (`2023-10-11T14:29:33.770`) -* [CVE-2023-36549](CVE-2023/CVE-2023-365xx/CVE-2023-36549.json) (`2023-10-11T14:30:18.603`) -* [CVE-2023-36550](CVE-2023/CVE-2023-365xx/CVE-2023-36550.json) (`2023-10-11T14:30:45.603`) -* [CVE-2023-1437](CVE-2023/CVE-2023-14xx/CVE-2023-1437.json) (`2023-10-11T15:15:09.400`) -* [CVE-2023-28321](CVE-2023/CVE-2023-283xx/CVE-2023-28321.json) (`2023-10-11T15:15:09.543`) -* [CVE-2023-44981](CVE-2023/CVE-2023-449xx/CVE-2023-44981.json) (`2023-10-11T15:15:09.733`) +* [CVE-2023-44232](CVE-2023/CVE-2023-442xx/CVE-2023-44232.json) (`2023-10-11T17:34:46.240`) +* [CVE-2023-40648](CVE-2023/CVE-2023-406xx/CVE-2023-40648.json) (`2023-10-11T17:35:02.967`) +* [CVE-2023-40649](CVE-2023/CVE-2023-406xx/CVE-2023-40649.json) (`2023-10-11T17:35:11.907`) +* [CVE-2023-40650](CVE-2023/CVE-2023-406xx/CVE-2023-40650.json) (`2023-10-11T17:35:18.570`) +* [CVE-2023-40651](CVE-2023/CVE-2023-406xx/CVE-2023-40651.json) (`2023-10-11T17:35:31.657`) +* [CVE-2023-40652](CVE-2023/CVE-2023-406xx/CVE-2023-40652.json) (`2023-10-11T17:35:49.427`) +* [CVE-2023-40642](CVE-2023/CVE-2023-406xx/CVE-2023-40642.json) (`2023-10-11T17:36:05.063`) +* [CVE-2023-40643](CVE-2023/CVE-2023-406xx/CVE-2023-40643.json) (`2023-10-11T17:36:14.043`) +* [CVE-2023-40644](CVE-2023/CVE-2023-406xx/CVE-2023-40644.json) (`2023-10-11T17:36:21.670`) +* [CVE-2023-40645](CVE-2023/CVE-2023-406xx/CVE-2023-40645.json) (`2023-10-11T17:36:33.700`) +* [CVE-2023-40646](CVE-2023/CVE-2023-406xx/CVE-2023-40646.json) (`2023-10-11T17:36:47.633`) +* [CVE-2023-40647](CVE-2023/CVE-2023-406xx/CVE-2023-40647.json) (`2023-10-11T17:36:55.953`) +* [CVE-2023-44231](CVE-2023/CVE-2023-442xx/CVE-2023-44231.json) (`2023-10-11T17:37:04.393`) +* [CVE-2023-43260](CVE-2023/CVE-2023-432xx/CVE-2023-43260.json) (`2023-10-11T17:37:27.503`) +* [CVE-2023-30690](CVE-2023/CVE-2023-306xx/CVE-2023-30690.json) (`2023-10-11T17:37:55.533`) +* [CVE-2023-32971](CVE-2023/CVE-2023-329xx/CVE-2023-32971.json) (`2023-10-11T17:38:24.087`) +* [CVE-2023-43261](CVE-2023/CVE-2023-432xx/CVE-2023-43261.json) (`2023-10-11T17:39:00.060`) +* [CVE-2023-5113](CVE-2023/CVE-2023-51xx/CVE-2023-5113.json) (`2023-10-11T17:41:34.833`) +* [CVE-2023-42755](CVE-2023/CVE-2023-427xx/CVE-2023-42755.json) (`2023-10-11T17:42:18.387`) +* [CVE-2023-42754](CVE-2023/CVE-2023-427xx/CVE-2023-42754.json) (`2023-10-11T17:42:42.080`) +* [CVE-2023-44387](CVE-2023/CVE-2023-443xx/CVE-2023-44387.json) (`2023-10-11T17:46:10.753`) +* [CVE-2023-44386](CVE-2023/CVE-2023-443xx/CVE-2023-44386.json) (`2023-10-11T17:47:30.137`) +* [CVE-2023-43793](CVE-2023/CVE-2023-437xx/CVE-2023-43793.json) (`2023-10-11T17:47:46.247`) +* [CVE-2023-44384](CVE-2023/CVE-2023-443xx/CVE-2023-44384.json) (`2023-10-11T17:49:49.353`) +* [CVE-2023-44860](CVE-2023/CVE-2023-448xx/CVE-2023-44860.json) (`2023-10-11T17:54:51.067`) ## Download and Usage