From e6c2ce6273f7354e2782e1e9e4b4710f8582a7b8 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ren=C3=A9=20Helmke?= Date: Tue, 9 May 2023 23:55:47 +0200 Subject: [PATCH] Auto-Update: 2023-05-09T21:55:44.778583+00:00 --- CVE-2018/CVE-2018-250xx/CVE-2018-25085.json | 68 +- CVE-2021/CVE-2021-263xx/CVE-2021-26354.json | 4 +- CVE-2021/CVE-2021-263xx/CVE-2021-26356.json | 4 +- CVE-2021/CVE-2021-263xx/CVE-2021-26365.json | 4 +- CVE-2021/CVE-2021-263xx/CVE-2021-26371.json | 4 +- CVE-2021/CVE-2021-263xx/CVE-2021-26379.json | 4 +- CVE-2021/CVE-2021-263xx/CVE-2021-26397.json | 4 +- CVE-2021/CVE-2021-264xx/CVE-2021-26406.json | 4 +- CVE-2021/CVE-2021-467xx/CVE-2021-46749.json | 4 +- CVE-2021/CVE-2021-467xx/CVE-2021-46753.json | 4 +- CVE-2021/CVE-2021-467xx/CVE-2021-46754.json | 20 + CVE-2021/CVE-2021-467xx/CVE-2021-46755.json | 20 + CVE-2021/CVE-2021-467xx/CVE-2021-46756.json | 24 + CVE-2021/CVE-2021-467xx/CVE-2021-46759.json | 20 + CVE-2021/CVE-2021-467xx/CVE-2021-46760.json | 20 + CVE-2021/CVE-2021-467xx/CVE-2021-46762.json | 4 +- CVE-2021/CVE-2021-467xx/CVE-2021-46763.json | 4 +- CVE-2021/CVE-2021-467xx/CVE-2021-46764.json | 4 +- CVE-2021/CVE-2021-467xx/CVE-2021-46765.json | 20 + CVE-2021/CVE-2021-467xx/CVE-2021-46769.json | 4 +- CVE-2021/CVE-2021-467xx/CVE-2021-46773.json | 20 + CVE-2021/CVE-2021-467xx/CVE-2021-46775.json | 4 +- CVE-2021/CVE-2021-467xx/CVE-2021-46792.json | 20 + CVE-2021/CVE-2021-467xx/CVE-2021-46794.json | 20 + CVE-2022/CVE-2022-238xx/CVE-2022-23818.json | 4 +- CVE-2022/CVE-2022-43xx/CVE-2022-4376.json | 84 +- CVE-2022/CVE-2022-481xx/CVE-2022-48186.json | 57 +- CVE-2023/CVE-2023-07xx/CVE-2023-0756.json | 83 +- CVE-2023/CVE-2023-08xx/CVE-2023-0805.json | 84 +- CVE-2023/CVE-2023-08xx/CVE-2023-0896.json | 69 +- CVE-2023/CVE-2023-11xx/CVE-2023-1178.json | 106 +- CVE-2023/CVE-2023-12xx/CVE-2023-1204.json | 84 +- CVE-2023/CVE-2023-12xx/CVE-2023-1265.json | 84 +- CVE-2023/CVE-2023-18xx/CVE-2023-1836.json | 84 +- CVE-2023/CVE-2023-19xx/CVE-2023-1965.json | 84 +- CVE-2023/CVE-2023-19xx/CVE-2023-1968.json | 376 ++- CVE-2023/CVE-2023-205xx/CVE-2023-20520.json | 4 +- CVE-2023/CVE-2023-205xx/CVE-2023-20524.json | 4 +- CVE-2023/CVE-2023-21xx/CVE-2023-2182.json | 71 +- CVE-2023/CVE-2023-226xx/CVE-2023-22637.json | 65 +- CVE-2023/CVE-2023-254xx/CVE-2023-25495.json | 3182 ++++++++++++++++++- CVE-2023/CVE-2023-258xx/CVE-2023-25831.json | 59 + CVE-2023/CVE-2023-258xx/CVE-2023-25832.json | 59 + CVE-2023/CVE-2023-297xx/CVE-2023-29778.json | 81 +- CVE-2023/CVE-2023-300xx/CVE-2023-30056.json | 28 + CVE-2023/CVE-2023-300xx/CVE-2023-30057.json | 28 + CVE-2023/CVE-2023-314xx/CVE-2023-31433.json | 69 +- README.md | 146 +- 48 files changed, 5099 insertions(+), 204 deletions(-) create mode 100644 CVE-2021/CVE-2021-467xx/CVE-2021-46754.json create mode 100644 CVE-2021/CVE-2021-467xx/CVE-2021-46755.json create mode 100644 CVE-2021/CVE-2021-467xx/CVE-2021-46756.json create mode 100644 CVE-2021/CVE-2021-467xx/CVE-2021-46759.json create mode 100644 CVE-2021/CVE-2021-467xx/CVE-2021-46760.json create mode 100644 CVE-2021/CVE-2021-467xx/CVE-2021-46765.json create mode 100644 CVE-2021/CVE-2021-467xx/CVE-2021-46773.json create mode 100644 CVE-2021/CVE-2021-467xx/CVE-2021-46792.json create mode 100644 CVE-2021/CVE-2021-467xx/CVE-2021-46794.json create mode 100644 CVE-2023/CVE-2023-258xx/CVE-2023-25831.json create mode 100644 CVE-2023/CVE-2023-258xx/CVE-2023-25832.json create mode 100644 CVE-2023/CVE-2023-300xx/CVE-2023-30056.json create mode 100644 CVE-2023/CVE-2023-300xx/CVE-2023-30057.json diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25085.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25085.json index 516eb351c4d..2a6eca03173 100644 --- a/CVE-2018/CVE-2018-250xx/CVE-2018-25085.json +++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25085.json @@ -2,8 +2,8 @@ "id": "CVE-2018-25085", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-01T05:15:08.633", - "lastModified": "2023-05-01T10:39:42.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T21:08:40.580", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,26 +93,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:drupal:responsive_menus:7.x-1.7:*:*:*:*:drupal:*:*", + "matchCriteriaId": "630B9B32-8E34-448F-8ABA-AC3A2FEF015E" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.drupalcode.org/project/responsive_menus/-/commit/3c554b31d32a367188f44d44857b061eac949fb8", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://vuldb.com/?ctiid.227755", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.227755", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.drupal.org/project/responsive_menus/releases/7.x-1.7", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.drupal.org/sa-contrib-2018-079", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-263xx/CVE-2021-26354.json b/CVE-2021/CVE-2021-263xx/CVE-2021-26354.json index b8712590a47..f841c1f707d 100644 --- a/CVE-2021/CVE-2021-263xx/CVE-2021-26354.json +++ b/CVE-2021/CVE-2021-263xx/CVE-2021-26354.json @@ -2,8 +2,8 @@ "id": "CVE-2021-26354", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:10.670", - "lastModified": "2023-05-09T19:15:10.670", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-263xx/CVE-2021-26356.json b/CVE-2021/CVE-2021-263xx/CVE-2021-26356.json index fa40a9c8b8b..5396412fee6 100644 --- a/CVE-2021/CVE-2021-263xx/CVE-2021-26356.json +++ b/CVE-2021/CVE-2021-263xx/CVE-2021-26356.json @@ -2,8 +2,8 @@ "id": "CVE-2021-26356", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:10.737", - "lastModified": "2023-05-09T19:15:10.737", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-263xx/CVE-2021-26365.json b/CVE-2021/CVE-2021-263xx/CVE-2021-26365.json index 5042155daf0..21f71d1be10 100644 --- a/CVE-2021/CVE-2021-263xx/CVE-2021-26365.json +++ b/CVE-2021/CVE-2021-263xx/CVE-2021-26365.json @@ -2,8 +2,8 @@ "id": "CVE-2021-26365", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:10.780", - "lastModified": "2023-05-09T19:15:10.780", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-263xx/CVE-2021-26371.json b/CVE-2021/CVE-2021-263xx/CVE-2021-26371.json index 03515a7ea37..cc2ad701ce8 100644 --- a/CVE-2021/CVE-2021-263xx/CVE-2021-26371.json +++ b/CVE-2021/CVE-2021-263xx/CVE-2021-26371.json @@ -2,8 +2,8 @@ "id": "CVE-2021-26371", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:10.820", - "lastModified": "2023-05-09T19:15:10.820", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-263xx/CVE-2021-26379.json b/CVE-2021/CVE-2021-263xx/CVE-2021-26379.json index 34adb1763bf..df6da93da4c 100644 --- a/CVE-2021/CVE-2021-263xx/CVE-2021-26379.json +++ b/CVE-2021/CVE-2021-263xx/CVE-2021-26379.json @@ -2,8 +2,8 @@ "id": "CVE-2021-26379", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:10.863", - "lastModified": "2023-05-09T19:15:10.863", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-263xx/CVE-2021-26397.json b/CVE-2021/CVE-2021-263xx/CVE-2021-26397.json index 6c0ae06abe3..72964bd8fd0 100644 --- a/CVE-2021/CVE-2021-263xx/CVE-2021-26397.json +++ b/CVE-2021/CVE-2021-263xx/CVE-2021-26397.json @@ -2,8 +2,8 @@ "id": "CVE-2021-26397", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:10.903", - "lastModified": "2023-05-09T19:15:10.903", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-264xx/CVE-2021-26406.json b/CVE-2021/CVE-2021-264xx/CVE-2021-26406.json index 09161bf0d61..25ae7fd9d2d 100644 --- a/CVE-2021/CVE-2021-264xx/CVE-2021-26406.json +++ b/CVE-2021/CVE-2021-264xx/CVE-2021-26406.json @@ -2,8 +2,8 @@ "id": "CVE-2021-26406", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:10.943", - "lastModified": "2023-05-09T19:15:10.943", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46749.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46749.json index 4604279fe2b..9993dd4c4ee 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46749.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46749.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46749", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:10.997", - "lastModified": "2023-05-09T19:15:10.997", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46753.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46753.json index b92a2f6e58c..a20b79d9a85 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46753.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46753.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46753", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.040", - "lastModified": "2023-05-09T19:15:11.040", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46754.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46754.json new file mode 100644 index 00000000000..583648ddbaa --- /dev/null +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46754.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2021-46754", + "sourceIdentifier": "psirt@amd.com", + "published": "2023-05-09T20:15:12.103", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Insufficient input validation in the ASP (AMD\nSecure Processor) bootloader may allow an attacker with a compromised Uapp or\nABL to coerce the bootloader into exposing sensitive information to the SMU\n(System Management Unit) resulting in a potential loss of confidentiality and\nintegrity.\n\n\n\n\n\n\n\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46755.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46755.json new file mode 100644 index 00000000000..064236f28aa --- /dev/null +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46755.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2021-46755", + "sourceIdentifier": "psirt@amd.com", + "published": "2023-05-09T20:15:12.157", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Failure to unmap certain SysHub mappings in\nerror paths of the ASP (AMD Secure Processor) bootloader may allow an attacker\nwith a malicious bootloader to exhaust the SysHub resources resulting in a\npotential denial of service.\n\n\n\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46756.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46756.json new file mode 100644 index 00000000000..d85bfdc87e2 --- /dev/null +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46756.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2021-46756", + "sourceIdentifier": "psirt@amd.com", + "published": "2023-05-09T20:15:12.200", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Insufficient validation of inputs in\nSVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an\nattacker with a malicious Uapp or ABL to send malformed or invalid syscall to\nthe bootloader resulting in a potential denial of service and loss of\nintegrity.\n\n\n\n\n\n\n\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001", + "source": "psirt@amd.com" + }, + { + "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46759.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46759.json new file mode 100644 index 00000000000..04d24b4dbcb --- /dev/null +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46759.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2021-46759", + "sourceIdentifier": "psirt@amd.com", + "published": "2023-05-09T20:15:12.240", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper syscall input validation in AMD TEE\n(Trusted Execution Environment) may allow an attacker with physical access and\ncontrol of a Uapp that runs under the bootloader to reveal the contents of the\nASP (AMD Secure Processor) bootloader accessible memory to a serial port,\nresulting in a potential loss of integrity.\n\n\n\n\n\n\n\n\n\n\n\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46760.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46760.json new file mode 100644 index 00000000000..a4a850acc4e --- /dev/null +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46760.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2021-46760", + "sourceIdentifier": "psirt@amd.com", + "published": "2023-05-09T20:15:12.283", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A malicious or compromised UApp or ABL can send\na malformed system call to the bootloader, which may result in an out-of-bounds\nmemory access that may potentially lead to an attacker leaking sensitive\ninformation or achieving code execution.\n\n\n\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46762.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46762.json index 209be9c1ead..f17f8ef0581 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46762.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46762.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46762", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.080", - "lastModified": "2023-05-09T19:15:11.080", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46763.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46763.json index c9abc5bcba0..a67c8221b39 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46763.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46763.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46763", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.123", - "lastModified": "2023-05-09T19:15:11.123", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46764.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46764.json index c801172767a..9153c4ff180 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46764.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46764.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46764", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.160", - "lastModified": "2023-05-09T19:15:11.160", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46765.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46765.json new file mode 100644 index 00000000000..4046b302b72 --- /dev/null +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46765.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2021-46765", + "sourceIdentifier": "psirt@amd.com", + "published": "2023-05-09T20:15:12.327", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Insufficient input validation in ASP may allow\nan attacker with a compromised SMM to induce out-of-bounds memory reads within\nthe ASP, potentially leading to a denial of service.\n\n\n\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46769.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46769.json index f17a9b4d023..c23c20684e3 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46769.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46769.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46769", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.200", - "lastModified": "2023-05-09T19:15:11.200", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46773.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46773.json new file mode 100644 index 00000000000..23a203f6efa --- /dev/null +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46773.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2021-46773", + "sourceIdentifier": "psirt@amd.com", + "published": "2023-05-09T20:15:12.370", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Insufficient input validation in ABL may enable\na privileged attacker to corrupt ASP memory, potentially resulting in a loss of\nintegrity or code execution.\n\n\n\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46775.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46775.json index 1487f98382d..682ec62b79d 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46775.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46775.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46775", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.240", - "lastModified": "2023-05-09T19:15:11.240", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46792.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46792.json new file mode 100644 index 00000000000..a7f5d0b02bf --- /dev/null +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46792.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2021-46792", + "sourceIdentifier": "psirt@amd.com", + "published": "2023-05-09T20:15:12.413", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Time-of-check Time-of-use (TOCTOU) in the\nBIOS2PSP command may allow an attacker with a malicious BIOS to create a race\ncondition causing the ASP bootloader to perform out-of-bounds SRAM reads upon\nan S3 resume event potentially leading to a denial of service.\n\n\n\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46794.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46794.json new file mode 100644 index 00000000000..50f0f17aa4b --- /dev/null +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46794.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2021-46794", + "sourceIdentifier": "psirt@amd.com", + "published": "2023-05-09T20:15:12.463", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Insufficient bounds checking in ASP (AMD Secure\nProcessor) may allow for an out of bounds read in SMI (System Management\nInterface) mailbox checksum calculation triggering a data abort, resulting in a\npotential denial of service.\n\n\n\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-238xx/CVE-2022-23818.json b/CVE-2022/CVE-2022-238xx/CVE-2022-23818.json index 60ba51e1b18..817c23aa748 100644 --- a/CVE-2022/CVE-2022-238xx/CVE-2022-23818.json +++ b/CVE-2022/CVE-2022-238xx/CVE-2022-23818.json @@ -2,8 +2,8 @@ "id": "CVE-2022-23818", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.367", - "lastModified": "2023-05-09T19:15:11.367", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4376.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4376.json index b2232016179..9237cda5e19 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4376.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4376.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4376", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-03T22:15:15.793", - "lastModified": "2023-05-04T13:03:12.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T20:57:13.993", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -34,18 +54,72 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.6.0", + "versionEndExcluding": "15.9.6", + "matchCriteriaId": "098EA22B-472A-43B5-8373-B60A532739FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.10", + "versionEndExcluding": "15.10.5", + "matchCriteriaId": "CF774F65-31C6-4F4A-8979-57D1568757E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.11", + "versionEndExcluding": "15.11.1", + "matchCriteriaId": "324922C6-938D-42CA-BA80-8BEEB29DAEC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4376.json", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/385246", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/1794713", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48186.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48186.json index 34389035caa..4559396d161 100644 --- a/CVE-2022/CVE-2022-481xx/CVE-2022-48186.json +++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48186.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48186", "sourceIdentifier": "psirt@lenovo.com", "published": "2023-05-01T15:15:09.083", - "lastModified": "2023-05-01T20:07:26.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T20:16:38.417", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "psirt@lenovo.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + }, { "source": "psirt@lenovo.com", "type": "Secondary", @@ -46,10 +76,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lenovo:baiying:*:*:*:*:*:android:*:*", + "versionEndExcluding": "1.1.4", + "matchCriteriaId": "ED3F4201-301E-4160-AAB8-8AFB77AA273D" + } + ] + } + ] + } + ], "references": [ { "url": "https://iknow.lenovo.com.cn/detail/dc_206093.html", - "source": "psirt@lenovo.com" + "source": "psirt@lenovo.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0756.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0756.json index 79056c79e88..1d844438865 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0756.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0756.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0756", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-03T22:15:16.073", - "lastModified": "2023-05-04T13:03:12.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T20:55:39.123", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -34,18 +54,71 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.9.6", + "matchCriteriaId": "1C574941-CFBA-4F52-9375-00D3E4525293" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.10", + "versionEndExcluding": "15.10.5", + "matchCriteriaId": "CF774F65-31C6-4F4A-8979-57D1568757E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.11", + "versionEndExcluding": "15.11.1", + "matchCriteriaId": "324922C6-938D-42CA-BA80-8BEEB29DAEC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0756.json", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/390910", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/1864278", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0805.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0805.json index 638024c45d2..facc3759b91 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0805.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0805.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0805", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-03T22:15:16.553", - "lastModified": "2023-05-04T13:03:12.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T20:54:24.150", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -34,18 +54,72 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.2", + "versionEndExcluding": "15.9.6", + "matchCriteriaId": "E2E34F11-F5E9-4EEE-954D-D3EEEB3F9AFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.10", + "versionEndExcluding": "15.10.5", + "matchCriteriaId": "4A0D75F4-8D11-4C69-B761-3312B5CDFCE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.11", + "versionEndExcluding": "15.11.1", + "matchCriteriaId": "E7B0DA1F-87DA-411A-8C20-3BF410B6EDB8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0805.json", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/391433", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/1850046", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0896.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0896.json index 200fd385fe9..8800e55886f 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0896.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0896.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0896", "sourceIdentifier": "psirt@lenovo.com", "published": "2023-05-01T14:15:09.397", - "lastModified": "2023-05-01T20:07:36.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T20:30:04.677", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@lenovo.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "psirt@lenovo.com", "type": "Secondary", @@ -46,10 +76,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:smart_clock_essential_with_alexa_built_in_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "90", + "matchCriteriaId": "692395B9-A6BE-4FEF-90D1-457FEA03B689" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:smart_clock_essential_with_alexa_built_in:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BB56A47-8209-4227-996D-9439C05715A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.lenovo.com/us/en/product_security/LEN-113714", - "source": "psirt@lenovo.com" + "source": "psirt@lenovo.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1178.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1178.json index 2870c781af7..fffd84db8e5 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1178.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1178.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1178", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-03T22:15:17.027", - "lastModified": "2023-05-04T13:03:05.007", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T20:53:30.140", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -34,18 +54,94 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "8.6.0", + "versionEndExcluding": "15.9.6", + "matchCriteriaId": "C649F4ED-B614-4133-853F-12DE8FD60E37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "8.6.0", + "versionEndExcluding": "15.9.6", + "matchCriteriaId": "9C77C875-FEA0-43C4-B7B7-9EA1C6473C69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "15.10", + "versionEndExcluding": "15.10.5", + "matchCriteriaId": "128CE092-2826-422E-BE7A-D2DDE15FAFC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.10", + "versionEndExcluding": "15.10.5", + "matchCriteriaId": "4A0D75F4-8D11-4C69-B761-3312B5CDFCE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "15.11", + "versionEndExcluding": "15.11.1", + "matchCriteriaId": "C8959805-2A8C-48BE-A0C2-8A1B1049826B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.11", + "versionEndExcluding": "15.11.1", + "matchCriteriaId": "E7B0DA1F-87DA-411A-8C20-3BF410B6EDB8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1178.json", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/381815", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/1778009", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1204.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1204.json index 64df01d3cf8..f07a50e06c4 100644 --- a/CVE-2023/CVE-2023-12xx/CVE-2023-1204.json +++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1204.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1204", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-03T21:15:16.707", - "lastModified": "2023-05-04T13:03:12.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T20:40:07.673", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -34,18 +54,72 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0", + "versionEndExcluding": "12.9.8", + "matchCriteriaId": "97201C83-37F2-46AB-B62A-CC351E6BF563" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.10", + "versionEndExcluding": "12.10.7", + "matchCriteriaId": "C227F637-E792-4A56-AF4C-81837FDFCA91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.0.1", + "matchCriteriaId": "D5EA4F3B-E5F3-4CFD-AE17-4FDF3FE78535" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1204.json", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/394745", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/1881598", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1265.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1265.json index bb98d8f8085..6484288a97d 100644 --- a/CVE-2023/CVE-2023-12xx/CVE-2023-1265.json +++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1265.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1265", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-03T21:15:17.307", - "lastModified": "2023-05-04T13:03:12.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T20:37:57.913", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -34,18 +54,72 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.9", + "versionEndExcluding": "15.9.6", + "matchCriteriaId": "A26A6860-E64D-44E7-BFCC-DBD19A6501C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.10", + "versionEndExcluding": "15.10.5", + "matchCriteriaId": "CF774F65-31C6-4F4A-8979-57D1568757E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.11", + "versionEndExcluding": "15.11.1", + "matchCriteriaId": "324922C6-938D-42CA-BA80-8BEEB29DAEC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1265.json", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/394960", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/1888690", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1836.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1836.json index 62f4f31081d..c94daa74a75 100644 --- a/CVE-2023/CVE-2023-18xx/CVE-2023-1836.json +++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1836.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1836", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-03T21:15:17.807", - "lastModified": "2023-05-04T13:03:12.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T20:12:36.977", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -34,18 +54,72 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "15.9.6", + "matchCriteriaId": "06A634B5-D0D2-49D4-B119-0F69CF07D016" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "15.10", + "versionEndExcluding": "15.10.5", + "matchCriteriaId": "128CE092-2826-422E-BE7A-D2DDE15FAFC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "15.11", + "versionEndExcluding": "15.11.1", + "matchCriteriaId": "C8959805-2A8C-48BE-A0C2-8A1B1049826B" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1836.json", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/404613", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/1923293", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1965.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1965.json index 5ff1035ccc6..f7f239e2181 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1965.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1965.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1965", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-03T21:15:18.220", - "lastModified": "2023-05-04T13:03:12.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T20:36:14.007", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -34,18 +54,72 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "14.2", + "versionEndExcluding": "15.9.6", + "matchCriteriaId": "25ED245F-8280-4467-A6C1-33F5CA94AC72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.10", + "versionEndExcluding": "15.10.5", + "matchCriteriaId": "4A0D75F4-8D11-4C69-B761-3312B5CDFCE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.11", + "versionEndExcluding": "15.11.1", + "matchCriteriaId": "E7B0DA1F-87DA-411A-8C20-3BF410B6EDB8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1965.json", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/406235", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/1923672", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1968.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1968.json index ef840edc3ea..65e2ecfa07c 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1968.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1968.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1968", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-04-28T19:15:16.647", - "lastModified": "2023-04-28T22:22:40.580", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T20:06:54.500", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -46,14 +76,352 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:illumina:iscan_firmware:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B5000279-D40B-4526-B911-9E0641736EE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:illumina:iscan_firmware:4.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "BD7BE281-02B5-4B87-A7E2-D0E3BB5309CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:illumina:iscan:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08732A94-734B-486E-AB2C-A2E2CA3C66AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:illumina:iseq_100_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D22304CE-8F36-4B51-BAA2-E2C564C04CDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:illumina:iseq_100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0136ED72-BF05-404D-910A-DA5B73F69771" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:illumina:miniseq_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0", + "matchCriteriaId": "E4B7C1F7-D185-4C72-B23C-A21103267CD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:illumina:miniseq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2DA69772-E795-4A64-A6A1-0BDD503D263B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:illumina:miseq_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0", + "matchCriteriaId": "CC028805-6ED3-455B-8F4C-95A8B8C5E756" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:illumina:miseq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AFB0D5A-AF5A-4A84-963F-C6307ADCFF4E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:illumina:miseqdx_firmware:*:*:*:*:-:*:*:*", + "versionStartIncluding": "4.0.1", + "matchCriteriaId": "E97A49E3-4B87-4FE5-8FD4-5B36C61A0650" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:illumina:miseqdx_firmware:4.0:*:*:*:ruo:*:*:*", + "matchCriteriaId": "BE1CBD4E-42B1-42C6-9B3F-4F715A5DBF6D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:illumina:miseqdx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBD56D9E-B16C-4ED4-A2E4-E73A3A9A599B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:illumina:nextseq_500_firmware:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "22E34BB5-591C-4889-851E-9A66212C8B8C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:illumina:nextseq_500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C7AEA5A-707D-4BF4-9DF6-BDE6E6D97B60" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:illumina:nextseq_550_firmware:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D02B5D-7E8A-41CD-BE27-5B012BE5C016" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:illumina:nextseq_550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF742B4D-0FC5-443A-8040-7B0A1B298707" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:illumina:nextseq_550dx_firmware:*:*:*:*:-:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndIncluding": "1.3.1", + "matchCriteriaId": "93DC004D-271D-4075-9828-E88CD7FFC403" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:illumina:nextseq_550dx_firmware:*:*:*:*:-:*:*:*", + "versionStartIncluding": "1.3.3", + "matchCriteriaId": "E199B789-BF31-40AC-B15E-31A97257002B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:illumina:nextseq_550dx_firmware:4.0:*:*:*:ruo:*:*:*", + "matchCriteriaId": "78D581A6-38A5-4F0A-A5CB-B25A9337EE78" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:illumina:nextseq_550dx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3D5AB9D-7EAA-45F2-A10F-A2D142B20D3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:illumina:nextseq_1000_firmware:1.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "94B82675-AA38-4584-82BD-9C376F80EA49" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:illumina:nextseq_1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93589C3C-F577-4C67-962F-166E28911ED2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:illumina:nextseq_2000_firmware:1.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6671E6F8-85D5-4970-98FE-6189C8F98852" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:illumina:nextseq_2000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "753D8FDF-5D25-46B9-8E66-30FB8E8A9A87" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:illumina:novaseq_6000_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.7", + "matchCriteriaId": "3A429D26-AF22-4AC2-AB02-76C72B9B9B05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:illumina:novaseq_6000_firmware:1.8:*:*:*:*:*:*:*", + "matchCriteriaId": "B4C702B1-4BAD-4E32-9659-D9F5C3F2F922" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:illumina:novaseq_6000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D879686-89E7-4152-AEF9-DC8A33FDA4A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.illumina.com/downloads/illumina-universal-copy-service-1-0.html", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-117-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20520.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20520.json index 8159b97b55b..1047f0af2f2 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20520.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20520.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20520", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.507", - "lastModified": "2023-05-09T19:15:11.507", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20524.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20524.json index 74aa42f63dc..ec313c58002 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20524.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20524.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20524", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.550", - "lastModified": "2023-05-09T19:15:11.550", - "vulnStatus": "Received", + "lastModified": "2023-05-09T20:27:45.710", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2182.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2182.json index 4f2a6fa6a65..16e43b4fadb 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2182.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2182.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2182", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-03T22:15:19.513", - "lastModified": "2023-05-04T13:03:05.007", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T20:47:13.967", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -34,14 +54,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.10.0", + "versionEndExcluding": "15.10.5", + "matchCriteriaId": "1A3B26FC-86C2-400D-8025-C4C6E2949549" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:15.11.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "49CD6C7F-81E5-422B-B29C-0C63B8FDF431" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2182.json", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/403012", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22637.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22637.json index 3f0c13aa7a9..c4dd6e52db5 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22637.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22637.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22637", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-05-03T22:15:17.337", - "lastModified": "2023-05-04T13:03:05.007", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T20:45:27.123", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,49 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.7.0", + "versionEndExcluding": "9.4.3", + "matchCriteriaId": "FD2141D0-A01A-471E-8FF3-D132897921E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "77DE647F-0252-42E2-8BDD-C98DC899C613" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-013", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25495.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25495.json index 3dd75baef63..26e64d6bbc1 100644 --- a/CVE-2023/CVE-2023-254xx/CVE-2023-25495.json +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25495.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25495", "sourceIdentifier": "psirt@lenovo.com", "published": "2023-04-28T22:15:08.950", - "lastModified": "2023-04-28T22:22:40.580", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T20:36:34.067", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "psirt@lenovo.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + }, { "source": "psirt@lenovo.com", "type": "Secondary", @@ -46,10 +76,3156 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx5530_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "46A578A7-5436-4B92-9860-75F637C2F12B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx5530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C62BC05D-7619-41CC-88F7-90EBC242A15F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx7530_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "6458E729-5B4D-4BF8-AC84-A73FA849A76B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx7530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "330331CB-6EF1-4263-B579-11E990C85F93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx3331_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "D9F1172B-8113-4B8C-8455-86B10115E94C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx3331:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBCFFB6F-C269-425B-AD66-9000BBC5DAE4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx_enclosure_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "BB1D00C0-21CC-430E-822C-4E13B65D0880" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx_enclosure:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2C22D09-B948-4EEE-9CEA-DAD0D8BE370E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx1021_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "2FE708B8-65A8-497D-93EF-322579CE3651" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx1021:-:*:*:*:*:*:*:*", + "matchCriteriaId": "536A78A4-9C58-400F-AFBB-73186A0D3FDC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx1320_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "EA6FC032-324D-4FDC-8C74-D9CF82797334" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx1320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E72B2526-8BD9-49FD-BDCF-B654BCEAC8AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx1321_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "E98CCEAA-3A3C-4087-93B1-6DE7995113A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx1321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADFD8C5A-D9E0-4EFF-92A3-17A6DBE7D155" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx1331_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "142D1A60-2F5D-457B-92B7-59595F034765" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx1331:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DD11357-E276-44E5-B825-F948D5A757CD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx1520-r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "CD6712D8-253F-4952-AB21-BBFA54BF822C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx1520-r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "648DD614-F500-4FFB-8FD4-D2B284FE5E55" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx1521-r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "688CFB0E-2095-4CE2-8CA4-E8BD32578F91" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx1521-r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D33A804F-C94C-4A6C-AA84-957834680652" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx2320-e_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "0659AED4-D4E5-4FB4-8B31-550AF9F88893" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx2320-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DECFCE59-8456-47A3-8A8E-989813E37674" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx2321_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "15BD47D1-90E7-4FC8-879D-E0EA9F72459A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx2321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5E515C4-D2F2-4A71-9A9C-70A80477352A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx2330_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "05CA0D28-CD71-4BDA-82B5-4528E68AEB8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx2330_firmware:2.93_afbt30p:*:*:*:*:*:*:*", + "matchCriteriaId": "2A825FF4-4686-4059-B291-64FB5AEBB866" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx2330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE6D9490-0456-4C77-867C-21339F52D19E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx2331_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "B915F44E-73A7-4DAF-9B2C-FEFACB62FB13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx2331:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA8CBCB0-7152-4FD0-A50E-280C42BB4B5E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx2720-e_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "4522BB27-A943-4188-B1C4-FA3CC0D2987C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx2720-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2574C115-7511-422C-9383-D09B021B4946" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3320_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "8363826A-2858-46AA-98E5-5C89EA581CFA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03D3EBE9-34C1-45CA-A800-B313110409DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3321_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "F734FE11-80B5-494F-BE28-8FB4AA00963A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86E6A2F7-7EC0-46E1-A973-2172B076E883" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3330_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "3D9FC871-32D4-400C-A1A3-BEB5D2C08204" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A30DA25-C17B-49A4-A5B5-21BC45C322C4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3331_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "8EFC6D85-7FCE-4D68-84A9-3F155F0C8244" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3331:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D66A9798-71F6-4884-AFC7-A695A713576A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3331_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.71_d8bt48p", + "matchCriteriaId": "F9E5F98C-2B3E-4434-91BE-9CC19832A527" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3331:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D66A9798-71F6-4884-AFC7-A695A713576A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3375_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.71_d8bt48p", + "matchCriteriaId": "9D8B787A-EF21-4EF8-A75E-E187C0F18E2C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8126219-A07C-42A6-9553-B6AE499DB6BF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3376_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "BEE6A10B-6BCA-4D66-928B-38CF142EBF19" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3376:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57D7A545-BE29-4F0B-AC77-8E6DE955CA5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3520-g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "32D2C9D3-D5AE-4DA4-AFF1-6F0FAC642F51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3520-g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D354C3-0183-42D9-97D0-C9888B023195" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3521-g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "857D7014-C3E6-478C-BF9C-82169315B351" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3521-g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E0DDCC8-46B7-43FA-8A4A-BCE8AB7F8480" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3720_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "D1E8FF43-8C7A-4354-9721-FB977104ECF4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3720:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C38326D-97DD-4A6B-985F-968570528C19" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx3721_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "27FBBDA1-52E7-4B14-AFA5-9263739232C5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx3721:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CCDE6B9-6505-4E44-A444-C4C3A054B5F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx5520_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "4DBC989B-CB17-4BCC-9FDE-AE6C550698C4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx5520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A9FDCC0-F45C-4AA1-BB11-0761A25BF16B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx5520-c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "9C19F289-5F84-4395-BEF1-F5DA7AED2DB3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx5520-c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EB95DEC-D622-4AD7-AC69-077A94BD752C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx5521_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "D0777AEE-1F2E-40B4-9AA6-4782AAE940A5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx5521:-:*:*:*:*:*:*:*", + "matchCriteriaId": "924C1B4B-6E97-4942-8000-BB59860913EE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx5521-c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "4239FD66-7A2E-40E2-B953-1EC32C208024" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx5521-c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5788FFBD-69B4-4FB6-A2D2-4C6BA6CCE769" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx5531_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "A1B8C4D2-C786-49B4-9B13-6975542D7504" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx5531:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FAEAB68-0F17-45BD-B0B9-0C5FD5BBE2AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx7520_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "DB1BAE65-812F-4B21-A4A0-060243B45B72" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx7520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16776C5F-CCAF-4F22-B570-FE49A0B73FF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx7521_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "94311D5A-15B6-43A9-9030-092421C591BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx7521:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F350D6FE-7BE1-46C9-B1A6-4EE0AF8BCB55" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx7530_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "6458E729-5B4D-4BF8-AC84-A73FA849A76B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx7530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "330331CB-6EF1-4263-B579-11E990C85F93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx7531_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "5154CD2F-AD5C-45D8-BDDF-3E57499A62B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx7531:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DD32840-AF55-49C1-A8B4-A4D3B0F85B45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx7531_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.75_psi348s", + "matchCriteriaId": "E6A3E984-CE12-4694-BE64-FAC6478C0F38" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx7531:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DD32840-AF55-49C1-A8B4-A4D3B0F85B45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx7820_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.75_psi348s", + "matchCriteriaId": "F611877D-BE44-4937-8341-A00EEBD4E870" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx7820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA2540A2-1462-42F7-949C-9881544DE684" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_hx7821_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "1D2C5786-2B7B-4F04-AFC2-51C6EF62DA7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_hx7821:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E153D62-9443-4F52-BA47-5C2704E05BC9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx1020_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "5BE64E31-8CD0-431E-BEDC-F23A31DBA009" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx1020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF0E5EF6-2664-4DEC-BD90-BF3128DC9DA6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx3330-f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "68A20D8C-90CC-436E-8125-C471C5C41261" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx3330-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "308EAB87-EF05-487F-B5AA-4D7E58937BB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx3330-h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "813A389B-F55B-4B16-A67D-AC565228AE4B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx3330-h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1387DB10-2478-41E8-937A-98012A5FAB6F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx3331-f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "BA3EBCAA-0456-4DC8-834F-FDFCB3A41240" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx3331-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2EB352F-AFEB-433D-84A3-5C849B658647" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx3331-h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "FC2F4A4F-C30B-4322-8E54-159E83027FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx3331-h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CC19B72-13E8-4F13-89AC-2112FC6EE809" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx3530_f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "1947D638-A324-483D-BC37-5AB3B345935B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx3530_f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B55863D2-D2A9-4BFC-9560-2E0DF99388C0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx3530-h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "747BF99D-6B3A-4954-B99E-107E55F828A1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx3530-h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E740BCC-B3FF-4A6E-B9CD-0D13FAE1D9FE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx3531_h_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "65611366-BA40-4064-B617-9320BA705C7A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx3531_h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF566DC8-C3A9-49AF-8B9C-C4FB8D94A7F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx3531-f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "89CD08E6-5746-495B-A9E1-DF8F7A7BE347" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx3531-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0F87CEA-8200-4345-9804-693D5B8F98A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_mx1021_on_se350_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "6B7FF257-18D2-4543-8C5A-E37116DC28FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_mx1021_on_se350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FA103E0-C6DC-4D57-8538-6AA71E6CEF99" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx_1se_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "C23661E8-A862-4ACC-9B71-07C0DEC1BBB1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx_1se:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FEBC1C9E-C548-4881-817B-109943BEA02F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx_2u4n_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "E93D0BA3-1BA9-456E-856E-C33E247C5504" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx_2u4n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B5DD2F7-6D91-42A5-827D-9A44F319CB01" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx_4u_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.75_psi348s", + "matchCriteriaId": "CB958079-C9EC-45DE-B00B-46415BA1622E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx_4u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33D2593D-E1D1-4C4F-884A-5E877E92C715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx1320_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "6B6F3B7E-020F-434E-B783-8F99AE03A321" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx1320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D11E00E8-4234-401D-8A0E-6EC1A15F44BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx2320_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "AFE27D87-68EC-430A-81D4-26CD3FF32C59" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx2320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF7500A0-B95E-4E16-B532-28C139C94AF3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx2330_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "2CE03063-DDCF-41C3-8E87-AF633EC1EF5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx2330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCDB5BE9-76C0-4708-805E-6DA37E91648F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx3320_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "71B491BF-9E31-4F61-99CE-1CC56674307C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx3320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A8B3E93-970D-4B49-B5A6-6BFAC45BAAC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx3330_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "E3A5670D-01D2-470A-8FB7-7C671262EA4B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx3330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F449A0D-B2EA-4747-BA7E-88CD4371220C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx3520-g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "BB7F61E0-643F-4DB1-9443-64419C6E24A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx3520-g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72422C47-0027-4B4E-9C82-78FE8A8A6D75" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx3530-g_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "C3B6116B-60E4-4812-AE59-3077C6F2DC54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx3530-g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E73BA833-D02E-4274-ABF7-8F1D41815AB3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx3720_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "D4B2AF5E-FBA2-4849-A8AF-DABF740EF58F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx3720:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE87366A-7CDB-46B7-AB89-7839D41B7E25" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx5520_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "CCB8C97C-EA12-43B8-9045-4880407C1DC1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx5520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704A1043-7626-412C-8666-9088B3AA1147" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx5530_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "399D2889-4FB6-4905-880D-7CB54FF3026B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx5530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81BDD8F1-B6B4-48D9-854F-9BFE19CD2B94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx7320_n_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "8521B23A-3D81-44EE-822D-29CD56DB1B72" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx7320_n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "435794D6-7773-4D93-96E2-7269EB863A04" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx7330_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "F5045D7C-7A21-46D3-B134-D98EC417C0EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx7330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "166A619E-C222-4169-8A68-8E718BE27355" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx7520_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "047ECA24-3DF5-40D3-ABC4-1ED5FF7B71E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx7520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E25483F5-F222-42AF-ACA4-580CD2965C55" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx7520_n_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "5657C581-5228-4682-B7DD-CD80E3FC257A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx7520_n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C923CF1-EB97-431F-9D85-0CB5C921A040" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx7530_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "DE4798E2-B3C8-4403-B17C-4E625DC44A37" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx7530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDD5438A-321C-4C7E-9170-C80DA27F9271" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx7531_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "CC0BBC40-968C-42C2-9E04-0815105D8042" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx7531:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6DC1F2D-AA5A-49D4-A0FD-491B1938406F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkagile_vx7820_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.75_psi348s", + "matchCriteriaId": "F109BF72-D7BB-461A-AA30-E76935BA609D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkagile_vx7820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E690D37-4DFD-477A-B159-C31D50215C90" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkedge_se450__firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.60_usx324o", + "matchCriteriaId": "B86C0C5D-4B78-4D27-A05E-8BD86A70ED5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkedge_se450_:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8F49BD4-9119-4557-826A-7281C23F484D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinkstation_p920_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "9EA34703-1E2C-4176-8709-605E4F2A02DC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinkstation_p920:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D47FCAA7-B33F-4F00-85BA-AA8ED4790572" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sd530_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "B991E62F-B51F-4099-898A-77163DECC89D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sd530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2588DA2E-6E58-4FA2-9AA6-FC669C042197" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sd630_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "445A9ABC-DE1D-44A6-9923-AB40FD0805FD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sd630_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "123E924B-D00B-4B9F-B890-1EF670D16F45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sd650_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "F361E67B-3AF7-45A4-9706-89FC6E334FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sd650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A1FF5D0-CC08-42B0-9798-55ED911B3EF6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sd650_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "DC2DA420-0751-4277-8A1F-5B91F28E12A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sd650_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4729C86-050B-4C6B-96F2-7C60AC3086B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sd650-n_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "B7366A53-32BD-4E02-9279-7753A450341B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sd650-n_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2E11CA6-2B14-4F2F-A6D3-A3F3A0199FAD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_se350_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "8F3136AC-3E8C-4656-8F39-297318ED0A92" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_se350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD4B877C-8D19-4AD2-948D-ADBD9B1BEEED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sn550_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "7432CA66-F205-468A-907A-38D1D682A52A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sn550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DB64709-93BA-43D8-A1DB-4CE405291430" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sn550_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "0D45F7DC-29BD-4B69-AA74-49C02932176B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sn550_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2728329-AC98-4AB6-B448-C1B203027593" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sn850_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "366829A3-C06E-487D-8A19-B4E0BA89A1D0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sn850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1DB0C393-2CB4-485F-93E2-2F28B19F9325" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr150_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "E5071012-4ACA-49B4-B2E4-CF58EFCF3F3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6334030-07E4-45F4-A233-4A37F77FC573" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr158_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "5DA538D2-D68F-4A81-9542-D16D9B9CDDBD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr158:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D94182EE-10FE-4506-BDE0-06F4140923FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr250_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "B040A2F8-14A4-4771-825C-4DFE8373BFC6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C5B52AC1-714E-4217-8599-80D99E0D33B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr250_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "2DEFAAB8-2DA6-43FF-BC68-56B55896DEDD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr250_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "071805DB-3A2D-4280-8774-08374DF4CD93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr258_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "3AB2F675-A323-4FD5-AD9E-5043FC7C54CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr258:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB19D273-4975-4957-AE94-117B607CD746" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr258_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "3F7C1851-4290-4F17-9AAD-2F7405CEDC0F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr258_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "466F8F21-C0F8-45CF-9C02-57FBE489645F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr530_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "A60174DF-78B5-4386-A6AC-93056F9C8A4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4C6628A-8A99-4841-A7C5-0445A03C638D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr550_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "335F4367-870F-46FE-B386-99963D299D02" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D10850BF-A7EA-4B84-B2EF-66DCCC301514" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr570_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "796B8297-3696-47B7-AFF3-208673BEC73D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A7C5BE3-5429-46B0-B0B5-C86A9B6376A7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr590_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "549082C5-9A49-47A7-B8F5-A021205189C8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3DC615C-A88A-4C45-892F-77C5E84104E8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr630_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "E9B558D7-23FD-4717-B125-9334740E89C9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr630:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D7F10C8D-C9C7-4FAD-980D-7A602C8BE81D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr630_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "9FD2C32D-CE92-4267-B721-4E6BA3BCEBEF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr630_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF029E34-9819-404D-BEBC-F540590EE8FD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr645_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.71_d8bt48p", + "matchCriteriaId": "96A0115D-E62B-45A5-9BEE-62A9596D315D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr645:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE27586B-1CC9-42A3-B763-93972E204A6D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr645_v3_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.71_d8bt48p", + "matchCriteriaId": "C7D7FA8D-4AB6-45C1-A6D0-130F87B14DB5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr645_v3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A3665C4-48C2-4050-916C-AEA0FAF30784" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr650_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "1C5D57E5-C539-4D7B-A32A-E54E7FF5B408" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6C2B5BB-6E1F-4E01-AAE8-A8239AB8945E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr650_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.93_afbt30p", + "matchCriteriaId": "5A75C9E8-7B9F-4343-B743-BD24A6F72C7A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr650_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D85AE20-A6A9-48E4-8CAD-537B87730867" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr665_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.71_d8bt48p", + "matchCriteriaId": "37F155A4-AB0C-443E-B8ED-45267CF704ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr665:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AE69184-CA94-4A27-AFF2-3B1B81D25CBA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr665_v3_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.71_d8bt48p", + "matchCriteriaId": "33898282-91C7-4365-86FF-D71336250153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr665_v3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "863C2705-D987-47B7-AA38-8222803CD83A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr670_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "70EFB884-36E2-4CDA-8836-65EEFB531CA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF1664DE-A6AE-4365-A652-80CEFECB62DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr670_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "C7A54480-EB88-4DE9-8C30-417BCD8D06FA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr670_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E97E5B4D-0E6F-49B0-8466-54A818517965" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr850_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "E4D79679-9E6C-453B-B4F8-195D0AE62A5B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19771143-D5F1-4F2F-AB83-09913894681E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr850_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "51B4C248-04B6-4B4F-A0CB-021C43DFB933" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr850_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F4710B7-E7EF-47A2-9585-8B6586FE036C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr850p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "ADF44750-740F-44C3-82A7-1A8908A571AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr850p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A833BF2-DD7B-4A09-AAB8-14C0C7C5DE10" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr860_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "78DE24D8-BE6C-4776-85C6-B30EA84F1EDA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr860:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAF08144-ECCB-477B-A934-E4578522BFEE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr860_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "616885E2-3714-4C4F-B881-441DAA40BF4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr860_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81D22E89-BE6A-4664-8E5B-7DB06DF9B553" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr950_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.75_psi348s", + "matchCriteriaId": "AD750E19-509E-4C9E-BDE0-D0CA8EF1F6C4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6B0407D-D603-48AE-9A42-F4C68056E19D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_st250_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "9FDBF980-D496-44AC-B7AF-E1FBD0BFEC9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_st250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBF2350D-34B1-44DB-8E4A-6F29B37D96CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_st250_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "DB77AEB0-D4A9-4987-B3A0-8F32FB38935A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_st250_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A83C7C5-8716-4C2F-A940-8F594DB106A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_st258_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.72_tei388s", + "matchCriteriaId": "04A90DDE-C19D-47B2-B3C4-A76D82ED39E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_st258:-:*:*:*:*:*:*:*", + "matchCriteriaId": "089F97B1-FEDE-4A5D-91D3-0517E8D39174" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_st258_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "FE973C76-76AA-4DC9-8155-0497E8BD8C5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_st258_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "31BF1FFA-1627-4F21-A9BC-8D3399681DBA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_st550_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.88_cdi3a4a", + "matchCriteriaId": "13E3631D-714F-493E-8C1F-059F17A776EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_st550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5B19107-5B45-4E45-8B34-90B5A1FF3962" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_st650_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "AF3840B6-84D3-493A-B635-EF9E937BC8E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_st650_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "968449F6-73F2-42C9-A3F4-3116408970F8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_st658_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.60_tgbt42h", + "matchCriteriaId": "ABC96406-9E8F-497F-BA52-E1E0777F9189" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_st658_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F32794E-362A-4A0B-8B13-95F42AA470CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.lenovo.com/us/en/product_security/LEN-99936", - "source": "psirt@lenovo.com" + "source": "psirt@lenovo.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-258xx/CVE-2023-25831.json b/CVE-2023/CVE-2023-258xx/CVE-2023-25831.json new file mode 100644 index 00000000000..a3a4d51d424 --- /dev/null +++ b/CVE-2023/CVE-2023-258xx/CVE-2023-25831.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-25831", + "sourceIdentifier": "psirt@esri.com", + "published": "2023-05-09T21:15:11.513", + "lastModified": "2023-05-09T21:15:11.513", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1, 10.8.1 and 10.7.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@esri.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@esri.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8095", + "source": "psirt@esri.com" + }, + { + "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/", + "source": "psirt@esri.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-258xx/CVE-2023-25832.json b/CVE-2023/CVE-2023-258xx/CVE-2023-25832.json new file mode 100644 index 00000000000..2f6f49ddc69 --- /dev/null +++ b/CVE-2023/CVE-2023-258xx/CVE-2023-25832.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-25832", + "sourceIdentifier": "psirt@esri.com", + "published": "2023-05-09T21:15:11.590", + "lastModified": "2023-05-09T21:15:11.590", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "There is a cross-site-request forgery vulnerability in Esri Portal for ArcGIS Versions 11.0 and below that may allow an attacker to trick an authorized user into executing unwanted actions.\u00a0" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@esri.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@esri.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8095", + "source": "psirt@esri.com" + }, + { + "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/", + "source": "psirt@esri.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29778.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29778.json index 502a3f82765..2815eede6bd 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29778.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29778.json @@ -2,23 +2,94 @@ "id": "CVE-2023-29778", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-02T20:15:10.813", - "lastModified": "2023-05-03T10:33:50.897", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T21:00:51.857", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "GL.iNET MT3000 4.1.0 Release 2 is vulnerable to OS Command Injection via /usr/lib/oui-httpd/rpc/logread." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:gl-mt3000_firmware:4.1.0:release_2:*:*:*:*:*:*", + "matchCriteriaId": "828261AE-6FED-4663-A030-3CD6230A4ADD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:gl-mt3000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D832083-488B-40F2-8D7A-66E917DF67F9" + } + ] + } + ] + } + ], "references": [ { "url": "http://glinet.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/OlivierLaflamme/cve/blob/main/GL.iNET/MT3000/get_nginx_log_RCE.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30056.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30056.json new file mode 100644 index 00000000000..3e94a236dd1 --- /dev/null +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30056.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-30056", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-09T21:15:11.673", + "lastModified": "2023-05-09T21:15:11.673", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A session takeover vulnerability exists in FICO Origination Manager Decision Module 4.8.1 due to insufficient protection of the JSESSIONID cookie." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://fico.com", + "source": "cve@mitre.org" + }, + { + "url": "http://origination.com", + "source": "cve@mitre.org" + }, + { + "url": "https://packetstormsecurity.com/files/172192/FICO-Origination-Manager-Decision-Module-4.8.1-XSS-Session-Hijacking.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30057.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30057.json new file mode 100644 index 00000000000..a9bc7e409f8 --- /dev/null +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30057.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-30057", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-09T21:15:11.717", + "lastModified": "2023-05-09T21:15:11.717", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in FICO Origination Manager Decision Module 4.8.1 allow attackers to execute arbitrary web scripts or HTML via a crafted payload." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://fico.com", + "source": "cve@mitre.org" + }, + { + "url": "http://origination.com", + "source": "cve@mitre.org" + }, + { + "url": "https://packetstormsecurity.com/files/172192/FICO-Origination-Manager-Decision-Module-4.8.1-XSS-Session-Hijacking.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31433.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31433.json index 9af92678131..393872019f1 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31433.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31433.json @@ -2,19 +2,80 @@ "id": "CVE-2023-31433", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-02T20:15:11.080", - "lastModified": "2023-05-03T10:33:46.147", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-09T20:46:59.023", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A SQL injection issue in Logbuch in evasys before 8.2 Build 2286 and 9.x before 9.0 Build 2401 allows authenticated attackers to execute SQL statements via the welche parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:evasys:evasys:8.2:-:*:*:*:*:*:*", + "matchCriteriaId": "121D8E08-632A-4DC6-A0BF-42FFA07BDFA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:evasys:evasys:9.0:-:*:*:*:*:*:*", + "matchCriteriaId": "29035721-2E02-440C-A59D-C19748D922D2" + } + ] + } + ] + } + ], "references": [ { "url": "https://cves.at/posts/cve-2023-31433/writeup/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 911d95b9731..413ad3ff9b1 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-09T20:00:32.334537+00:00 +2023-05-09T21:55:44.778583+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-09T19:58:32.077000+00:00 +2023-05-09T21:15:11.717000+00:00 ``` ### Last Data Feed Release @@ -29,108 +29,66 @@ Download and Changelog: [Click](releases/latest) ### Total Number of included CVEs ```plain -214637 +214650 ``` ### CVEs added in the last Commit -Recently added CVEs: `58` +Recently added CVEs: `13` -* [CVE-2021-26354](CVE-2021/CVE-2021-263xx/CVE-2021-26354.json) (`2023-05-09T19:15:10.670`) -* [CVE-2021-26356](CVE-2021/CVE-2021-263xx/CVE-2021-26356.json) (`2023-05-09T19:15:10.737`) -* [CVE-2021-26365](CVE-2021/CVE-2021-263xx/CVE-2021-26365.json) (`2023-05-09T19:15:10.780`) -* [CVE-2021-26371](CVE-2021/CVE-2021-263xx/CVE-2021-26371.json) (`2023-05-09T19:15:10.820`) -* [CVE-2021-26379](CVE-2021/CVE-2021-263xx/CVE-2021-26379.json) (`2023-05-09T19:15:10.863`) -* [CVE-2021-26397](CVE-2021/CVE-2021-263xx/CVE-2021-26397.json) (`2023-05-09T19:15:10.903`) -* [CVE-2021-26406](CVE-2021/CVE-2021-264xx/CVE-2021-26406.json) (`2023-05-09T19:15:10.943`) -* [CVE-2021-46749](CVE-2021/CVE-2021-467xx/CVE-2021-46749.json) (`2023-05-09T19:15:10.997`) -* [CVE-2021-46753](CVE-2021/CVE-2021-467xx/CVE-2021-46753.json) (`2023-05-09T19:15:11.040`) -* [CVE-2021-46762](CVE-2021/CVE-2021-467xx/CVE-2021-46762.json) (`2023-05-09T19:15:11.080`) -* [CVE-2021-46763](CVE-2021/CVE-2021-467xx/CVE-2021-46763.json) (`2023-05-09T19:15:11.123`) -* [CVE-2021-46764](CVE-2021/CVE-2021-467xx/CVE-2021-46764.json) (`2023-05-09T19:15:11.160`) -* [CVE-2021-46769](CVE-2021/CVE-2021-467xx/CVE-2021-46769.json) (`2023-05-09T19:15:11.200`) -* [CVE-2021-46775](CVE-2021/CVE-2021-467xx/CVE-2021-46775.json) (`2023-05-09T19:15:11.240`) -* [CVE-2022-23818](CVE-2022/CVE-2022-238xx/CVE-2022-23818.json) (`2023-05-09T19:15:11.367`) -* [CVE-2023-20046](CVE-2023/CVE-2023-200xx/CVE-2023-20046.json) (`2023-05-09T18:15:11.697`) -* [CVE-2023-20098](CVE-2023/CVE-2023-200xx/CVE-2023-20098.json) (`2023-05-09T18:15:11.760`) -* [CVE-2023-20520](CVE-2023/CVE-2023-205xx/CVE-2023-20520.json) (`2023-05-09T19:15:11.507`) -* [CVE-2023-20524](CVE-2023/CVE-2023-205xx/CVE-2023-20524.json) (`2023-05-09T19:15:11.550`) -* [CVE-2023-24898](CVE-2023/CVE-2023-248xx/CVE-2023-24898.json) (`2023-05-09T18:15:11.913`) -* [CVE-2023-24899](CVE-2023/CVE-2023-248xx/CVE-2023-24899.json) (`2023-05-09T18:15:11.970`) -* [CVE-2023-24900](CVE-2023/CVE-2023-249xx/CVE-2023-24900.json) (`2023-05-09T18:15:12.033`) -* [CVE-2023-24901](CVE-2023/CVE-2023-249xx/CVE-2023-24901.json) (`2023-05-09T18:15:12.097`) -* [CVE-2023-24902](CVE-2023/CVE-2023-249xx/CVE-2023-24902.json) (`2023-05-09T18:15:12.157`) -* [CVE-2023-24903](CVE-2023/CVE-2023-249xx/CVE-2023-24903.json) (`2023-05-09T18:15:12.217`) -* [CVE-2023-24904](CVE-2023/CVE-2023-249xx/CVE-2023-24904.json) (`2023-05-09T18:15:12.280`) -* [CVE-2023-24905](CVE-2023/CVE-2023-249xx/CVE-2023-24905.json) (`2023-05-09T18:15:12.347`) -* [CVE-2023-24932](CVE-2023/CVE-2023-249xx/CVE-2023-24932.json) (`2023-05-09T18:15:12.407`) -* [CVE-2023-24939](CVE-2023/CVE-2023-249xx/CVE-2023-24939.json) (`2023-05-09T18:15:12.467`) -* [CVE-2023-24940](CVE-2023/CVE-2023-249xx/CVE-2023-24940.json) (`2023-05-09T18:15:12.527`) -* [CVE-2023-24941](CVE-2023/CVE-2023-249xx/CVE-2023-24941.json) (`2023-05-09T18:15:12.587`) -* [CVE-2023-24942](CVE-2023/CVE-2023-249xx/CVE-2023-24942.json) (`2023-05-09T18:15:12.643`) -* [CVE-2023-24943](CVE-2023/CVE-2023-249xx/CVE-2023-24943.json) (`2023-05-09T18:15:12.720`) -* [CVE-2023-24944](CVE-2023/CVE-2023-249xx/CVE-2023-24944.json) (`2023-05-09T18:15:12.780`) -* [CVE-2023-24945](CVE-2023/CVE-2023-249xx/CVE-2023-24945.json) (`2023-05-09T18:15:12.840`) -* [CVE-2023-24946](CVE-2023/CVE-2023-249xx/CVE-2023-24946.json) (`2023-05-09T18:15:12.900`) -* [CVE-2023-24947](CVE-2023/CVE-2023-249xx/CVE-2023-24947.json) (`2023-05-09T18:15:12.960`) -* [CVE-2023-24948](CVE-2023/CVE-2023-249xx/CVE-2023-24948.json) (`2023-05-09T18:15:13.017`) -* [CVE-2023-24949](CVE-2023/CVE-2023-249xx/CVE-2023-24949.json) (`2023-05-09T18:15:13.080`) -* [CVE-2023-24950](CVE-2023/CVE-2023-249xx/CVE-2023-24950.json) (`2023-05-09T18:15:13.143`) -* [CVE-2023-24953](CVE-2023/CVE-2023-249xx/CVE-2023-24953.json) (`2023-05-09T18:15:13.203`) -* [CVE-2023-24954](CVE-2023/CVE-2023-249xx/CVE-2023-24954.json) (`2023-05-09T18:15:13.260`) -* [CVE-2023-24955](CVE-2023/CVE-2023-249xx/CVE-2023-24955.json) (`2023-05-09T18:15:13.317`) -* [CVE-2023-2609](CVE-2023/CVE-2023-26xx/CVE-2023-2609.json) (`2023-05-09T18:15:14.147`) -* [CVE-2023-28251](CVE-2023/CVE-2023-282xx/CVE-2023-28251.json) (`2023-05-09T18:15:13.433`) -* [CVE-2023-28283](CVE-2023/CVE-2023-282xx/CVE-2023-28283.json) (`2023-05-09T18:15:13.490`) -* [CVE-2023-28290](CVE-2023/CVE-2023-282xx/CVE-2023-28290.json) (`2023-05-09T18:15:13.547`) -* [CVE-2023-29324](CVE-2023/CVE-2023-293xx/CVE-2023-29324.json) (`2023-05-09T18:15:13.607`) -* [CVE-2023-29325](CVE-2023/CVE-2023-293xx/CVE-2023-29325.json) (`2023-05-09T18:15:13.667`) -* [CVE-2023-29333](CVE-2023/CVE-2023-293xx/CVE-2023-29333.json) (`2023-05-09T18:15:13.727`) -* [CVE-2023-29335](CVE-2023/CVE-2023-293xx/CVE-2023-29335.json) (`2023-05-09T18:15:13.783`) -* [CVE-2023-29336](CVE-2023/CVE-2023-293xx/CVE-2023-29336.json) (`2023-05-09T18:15:13.840`) -* [CVE-2023-29338](CVE-2023/CVE-2023-293xx/CVE-2023-29338.json) (`2023-05-09T18:15:13.900`) -* [CVE-2023-29340](CVE-2023/CVE-2023-293xx/CVE-2023-29340.json) (`2023-05-09T18:15:13.967`) -* [CVE-2023-29341](CVE-2023/CVE-2023-293xx/CVE-2023-29341.json) (`2023-05-09T18:15:14.027`) -* [CVE-2023-29343](CVE-2023/CVE-2023-293xx/CVE-2023-29343.json) (`2023-05-09T18:15:14.087`) -* [CVE-2023-31472](CVE-2023/CVE-2023-314xx/CVE-2023-31472.json) (`2023-05-09T18:15:14.283`) -* [CVE-2023-31474](CVE-2023/CVE-2023-314xx/CVE-2023-31474.json) (`2023-05-09T18:15:14.323`) +* [CVE-2021-46754](CVE-2021/CVE-2021-467xx/CVE-2021-46754.json) (`2023-05-09T20:15:12.103`) +* [CVE-2021-46755](CVE-2021/CVE-2021-467xx/CVE-2021-46755.json) (`2023-05-09T20:15:12.157`) +* [CVE-2021-46756](CVE-2021/CVE-2021-467xx/CVE-2021-46756.json) (`2023-05-09T20:15:12.200`) +* [CVE-2021-46759](CVE-2021/CVE-2021-467xx/CVE-2021-46759.json) (`2023-05-09T20:15:12.240`) +* [CVE-2021-46760](CVE-2021/CVE-2021-467xx/CVE-2021-46760.json) (`2023-05-09T20:15:12.283`) +* [CVE-2021-46765](CVE-2021/CVE-2021-467xx/CVE-2021-46765.json) (`2023-05-09T20:15:12.327`) +* [CVE-2021-46773](CVE-2021/CVE-2021-467xx/CVE-2021-46773.json) (`2023-05-09T20:15:12.370`) +* [CVE-2021-46792](CVE-2021/CVE-2021-467xx/CVE-2021-46792.json) (`2023-05-09T20:15:12.413`) +* [CVE-2021-46794](CVE-2021/CVE-2021-467xx/CVE-2021-46794.json) (`2023-05-09T20:15:12.463`) +* [CVE-2023-25831](CVE-2023/CVE-2023-258xx/CVE-2023-25831.json) (`2023-05-09T21:15:11.513`) +* [CVE-2023-25832](CVE-2023/CVE-2023-258xx/CVE-2023-25832.json) (`2023-05-09T21:15:11.590`) +* [CVE-2023-30056](CVE-2023/CVE-2023-300xx/CVE-2023-30056.json) (`2023-05-09T21:15:11.673`) +* [CVE-2023-30057](CVE-2023/CVE-2023-300xx/CVE-2023-30057.json) (`2023-05-09T21:15:11.717`) ### CVEs modified in the last Commit -Recently modified CVEs: `31` +Recently modified CVEs: `34` -* [CVE-2021-42847](CVE-2021/CVE-2021-428xx/CVE-2021-42847.json) (`2023-05-09T18:15:11.397`) -* [CVE-2022-20929](CVE-2022/CVE-2022-209xx/CVE-2022-20929.json) (`2023-05-09T18:15:11.500`) -* [CVE-2022-21229](CVE-2022/CVE-2022-212xx/CVE-2022-21229.json) (`2023-05-09T19:15:11.283`) -* [CVE-2022-25273](CVE-2022/CVE-2022-252xx/CVE-2022-25273.json) (`2023-05-09T18:47:56.107`) -* [CVE-2022-25274](CVE-2022/CVE-2022-252xx/CVE-2022-25274.json) (`2023-05-09T19:11:17.407`) -* [CVE-2022-25277](CVE-2022/CVE-2022-252xx/CVE-2022-25277.json) (`2023-05-09T19:26:40.053`) -* [CVE-2022-25772](CVE-2022/CVE-2022-257xx/CVE-2022-25772.json) (`2023-05-09T19:15:11.413`) -* [CVE-2022-28888](CVE-2022/CVE-2022-288xx/CVE-2022-28888.json) (`2023-05-09T18:15:11.600`) -* [CVE-2022-33273](CVE-2022/CVE-2022-332xx/CVE-2022-33273.json) (`2023-05-09T18:33:28.843`) -* [CVE-2022-45801](CVE-2022/CVE-2022-458xx/CVE-2022-45801.json) (`2023-05-09T18:09:27.697`) -* [CVE-2022-45802](CVE-2022/CVE-2022-458xx/CVE-2022-45802.json) (`2023-05-09T18:10:43.900`) -* [CVE-2022-46365](CVE-2022/CVE-2022-463xx/CVE-2022-46365.json) (`2023-05-09T18:04:19.747`) -* [CVE-2022-47877](CVE-2022/CVE-2022-478xx/CVE-2022-47877.json) (`2023-05-09T19:42:15.130`) -* [CVE-2023-0155](CVE-2023/CVE-2023-01xx/CVE-2023-0155.json) (`2023-05-09T19:53:24.107`) -* [CVE-2023-0485](CVE-2023/CVE-2023-04xx/CVE-2023-0485.json) (`2023-05-09T19:53:10.287`) -* [CVE-2023-1477](CVE-2023/CVE-2023-14xx/CVE-2023-1477.json) (`2023-05-09T19:38:42.500`) -* [CVE-2023-2069](CVE-2023/CVE-2023-20xx/CVE-2023-2069.json) (`2023-05-09T19:58:32.077`) -* [CVE-2023-2247](CVE-2023/CVE-2023-22xx/CVE-2023-2247.json) (`2023-05-09T18:23:24.153`) -* [CVE-2023-2479](CVE-2023/CVE-2023-24xx/CVE-2023-2479.json) (`2023-05-09T18:48:53.560`) -* [CVE-2023-24892](CVE-2023/CVE-2023-248xx/CVE-2023-24892.json) (`2023-05-09T18:15:11.823`) -* [CVE-2023-27568](CVE-2023/CVE-2023-275xx/CVE-2023-27568.json) (`2023-05-09T18:15:13.370`) -* [CVE-2023-29772](CVE-2023/CVE-2023-297xx/CVE-2023-29772.json) (`2023-05-09T18:40:44.477`) -* [CVE-2023-29918](CVE-2023/CVE-2023-299xx/CVE-2023-29918.json) (`2023-05-09T19:27:09.447`) -* [CVE-2023-30204](CVE-2023/CVE-2023-302xx/CVE-2023-30204.json) (`2023-05-09T19:43:20.183`) -* [CVE-2023-30268](CVE-2023/CVE-2023-302xx/CVE-2023-30268.json) (`2023-05-09T18:15:14.210`) -* [CVE-2023-30838](CVE-2023/CVE-2023-308xx/CVE-2023-30838.json) (`2023-05-09T19:46:44.303`) -* [CVE-2023-30847](CVE-2023/CVE-2023-308xx/CVE-2023-30847.json) (`2023-05-09T18:21:39.807`) -* [CVE-2023-30850](CVE-2023/CVE-2023-308xx/CVE-2023-30850.json) (`2023-05-09T18:18:04.593`) -* [CVE-2023-30859](CVE-2023/CVE-2023-308xx/CVE-2023-30859.json) (`2023-05-09T19:01:26.460`) -* [CVE-2023-30869](CVE-2023/CVE-2023-308xx/CVE-2023-30869.json) (`2023-05-09T18:25:38.057`) -* [CVE-2023-31207](CVE-2023/CVE-2023-312xx/CVE-2023-31207.json) (`2023-05-09T19:21:42.800`) +* [CVE-2018-25085](CVE-2018/CVE-2018-250xx/CVE-2018-25085.json) (`2023-05-09T21:08:40.580`) +* [CVE-2021-26354](CVE-2021/CVE-2021-263xx/CVE-2021-26354.json) (`2023-05-09T20:27:45.710`) +* [CVE-2021-26356](CVE-2021/CVE-2021-263xx/CVE-2021-26356.json) (`2023-05-09T20:27:45.710`) +* [CVE-2021-26365](CVE-2021/CVE-2021-263xx/CVE-2021-26365.json) (`2023-05-09T20:27:45.710`) +* [CVE-2021-26371](CVE-2021/CVE-2021-263xx/CVE-2021-26371.json) (`2023-05-09T20:27:45.710`) +* [CVE-2021-26379](CVE-2021/CVE-2021-263xx/CVE-2021-26379.json) (`2023-05-09T20:27:45.710`) +* [CVE-2021-26397](CVE-2021/CVE-2021-263xx/CVE-2021-26397.json) (`2023-05-09T20:27:45.710`) +* [CVE-2021-26406](CVE-2021/CVE-2021-264xx/CVE-2021-26406.json) (`2023-05-09T20:27:45.710`) +* [CVE-2021-46749](CVE-2021/CVE-2021-467xx/CVE-2021-46749.json) (`2023-05-09T20:27:45.710`) +* [CVE-2021-46753](CVE-2021/CVE-2021-467xx/CVE-2021-46753.json) (`2023-05-09T20:27:45.710`) +* [CVE-2021-46762](CVE-2021/CVE-2021-467xx/CVE-2021-46762.json) (`2023-05-09T20:27:45.710`) +* [CVE-2021-46763](CVE-2021/CVE-2021-467xx/CVE-2021-46763.json) (`2023-05-09T20:27:45.710`) +* [CVE-2021-46764](CVE-2021/CVE-2021-467xx/CVE-2021-46764.json) (`2023-05-09T20:27:45.710`) +* [CVE-2021-46769](CVE-2021/CVE-2021-467xx/CVE-2021-46769.json) (`2023-05-09T20:27:45.710`) +* [CVE-2021-46775](CVE-2021/CVE-2021-467xx/CVE-2021-46775.json) (`2023-05-09T20:27:45.710`) +* [CVE-2022-23818](CVE-2022/CVE-2022-238xx/CVE-2022-23818.json) (`2023-05-09T20:27:45.710`) +* [CVE-2022-4376](CVE-2022/CVE-2022-43xx/CVE-2022-4376.json) (`2023-05-09T20:57:13.993`) +* [CVE-2022-48186](CVE-2022/CVE-2022-481xx/CVE-2022-48186.json) (`2023-05-09T20:16:38.417`) +* [CVE-2023-0756](CVE-2023/CVE-2023-07xx/CVE-2023-0756.json) (`2023-05-09T20:55:39.123`) +* [CVE-2023-0805](CVE-2023/CVE-2023-08xx/CVE-2023-0805.json) (`2023-05-09T20:54:24.150`) +* [CVE-2023-0896](CVE-2023/CVE-2023-08xx/CVE-2023-0896.json) (`2023-05-09T20:30:04.677`) +* [CVE-2023-1178](CVE-2023/CVE-2023-11xx/CVE-2023-1178.json) (`2023-05-09T20:53:30.140`) +* [CVE-2023-1204](CVE-2023/CVE-2023-12xx/CVE-2023-1204.json) (`2023-05-09T20:40:07.673`) +* [CVE-2023-1265](CVE-2023/CVE-2023-12xx/CVE-2023-1265.json) (`2023-05-09T20:37:57.913`) +* [CVE-2023-1836](CVE-2023/CVE-2023-18xx/CVE-2023-1836.json) (`2023-05-09T20:12:36.977`) +* [CVE-2023-1965](CVE-2023/CVE-2023-19xx/CVE-2023-1965.json) (`2023-05-09T20:36:14.007`) +* [CVE-2023-1968](CVE-2023/CVE-2023-19xx/CVE-2023-1968.json) (`2023-05-09T20:06:54.500`) +* [CVE-2023-20520](CVE-2023/CVE-2023-205xx/CVE-2023-20520.json) (`2023-05-09T20:27:45.710`) +* [CVE-2023-20524](CVE-2023/CVE-2023-205xx/CVE-2023-20524.json) (`2023-05-09T20:27:45.710`) +* [CVE-2023-2182](CVE-2023/CVE-2023-21xx/CVE-2023-2182.json) (`2023-05-09T20:47:13.967`) +* [CVE-2023-22637](CVE-2023/CVE-2023-226xx/CVE-2023-22637.json) (`2023-05-09T20:45:27.123`) +* [CVE-2023-25495](CVE-2023/CVE-2023-254xx/CVE-2023-25495.json) (`2023-05-09T20:36:34.067`) +* [CVE-2023-29778](CVE-2023/CVE-2023-297xx/CVE-2023-29778.json) (`2023-05-09T21:00:51.857`) +* [CVE-2023-31433](CVE-2023/CVE-2023-314xx/CVE-2023-31433.json) (`2023-05-09T20:46:59.023`) ## Download and Usage