CINXE.COM
NVD - CVE-2023-20533
<!DOCTYPE html> <html lang="en"> <head><script type="text/javascript" src="https://web-static.archive.org/_static/js/bundle-playback.js?v=7YQSqjSh" charset="utf-8"></script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://nvd.nist.gov/vuln/detail/CVE-2023-20533","20231128115151","https://web.archive.org/","web","https://web-static.archive.org/_static/", "1701172311"); </script> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/banner-styles.css?v=p7PEIJWi" /> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <title>NVD - CVE-2023-20533</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8"/> <meta http-equiv="content-style-type" content="text/css"/> <meta http-equiv="content-script-type" content="text/javascript"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <link href="/web/20231128115151cs_/https://nvd.nist.gov/site-scripts/font-awesome/css/font-awesome.min.css" type="text/css" rel="stylesheet"/> <link href="/web/20231128115151cs_/https://nvd.nist.gov/site-media/bootstrap/css/bootstrap.min.css" type="text/css" rel="stylesheet"/> <link href="/web/20231128115151cs_/https://nvd.nist.gov/site-media/bootstrap/css/bootstrap-theme.min.css" type="text/css" rel="stylesheet"/> <link href="/web/20231128115151cs_/https://nvd.nist.gov/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css" type="text/css" rel="stylesheet"/> <link href="/web/20231128115151cs_/https://nvd.nist.gov/site-media/css/nist-fonts.css" type="text/css" rel="stylesheet"/> <link href="/web/20231128115151cs_/https://nvd.nist.gov/site-media/css/base-style.css" type="text/css" rel="stylesheet"/> <link href="/web/20231128115151cs_/https://nvd.nist.gov/site-media/css/media-resize.css" type="text/css" rel="stylesheet"/> <meta name="theme-color" content="#000000"> <script src="/web/20231128115151js_/https://nvd.nist.gov/site-scripts/jquery/dist/jquery.min.js" type="text/javascript"></script> <script src="/web/20231128115151js_/https://nvd.nist.gov/site-scripts/jquery-visible/jquery.visible.min.js" type="text/javascript"></script> <script src="/web/20231128115151js_/https://nvd.nist.gov/site-scripts/underscore/underscore-min.js" type="text/javascript"></script> <script src="/web/20231128115151js_/https://nvd.nist.gov/site-media/bootstrap/js/bootstrap.js" type="text/javascript"></script> <script src="/web/20231128115151js_/https://nvd.nist.gov/site-scripts/moment/min/moment.min.js" type="text/javascript"></script> <script src="/web/20231128115151js_/https://nvd.nist.gov/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js" type="text/javascript"></script> <script src="/web/20231128115151js_/https://nvd.nist.gov/site-media/js/megamenu.js" type="text/javascript"></script> <script src="/web/20231128115151js_/https://nvd.nist.gov/site-media/js/nist-exit-script.js" type="text/javascript"></script> <script src="/web/20231128115151js_/https://nvd.nist.gov/site-media/js/forms.js" type="text/javascript"></script> <script src="/web/20231128115151js_/https://nvd.nist.gov/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true" type="text/javascript" id="_fed_an_js_tag"></script> <!-- Google tag (gtag.js) --> <script async src="https://web.archive.org/web/20231128115151js_/https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script> <style id="antiClickjack"> body>* { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body>* { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjack"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout(tryForward(), 5000); } function tryForward() { top.location = self.location; } </script> <meta charset="UTF-8"> <link href="/web/20231128115151cs_/https://nvd.nist.gov/site-media/css/nvd-style.css" type="text/css" rel="stylesheet"/> <link href="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/favicons/apple-touch-icon.png" rel="apple-touch-icon" type="image/png" sizes="180x180"/> <link href="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/favicons/favicon-32x32.png" rel="icon" type="image/png" sizes="32x32"/> <link href="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/favicons/favicon-16x16.png" rel="icon" type="image/png" sizes="16x16"/> <link href="/web/20231128115151/https://nvd.nist.gov/site-media/images/favicons/manifest.json" rel="manifest"/> <link href="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/favicons/safari-pinned-tab.svg" rel="mask-icon" color="#000000"/> <link href="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/favicons/favicon.ico" rel="shortcut icon"/> <meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml"/> <link href="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/favicons/favicon.ico" rel="shortcut icon" type="image/x-icon"/> <link href="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/favicons/favicon.ico" rel="icon" type="image/x-icon"/> <meta charset="UTF-8"> <script src="/web/20231128115151js_/https://nvd.nist.gov/site-media/js/vulnerability/vulnDetail.js" type="text/javascript"></script> <script src="/web/20231128115151js_/https://nvd.nist.gov/site-media/js/vulnerability/cvssVulnDetail.js" type="text/javascript"></script> </head> <body> <header role="banner" title="Site Banner"> <div id="antiClickjack" style="display: none"> <h1>You are viewing this page in an unauthorized frame window.</h1> <p> This is a potential security issue, you are being redirected to <a href="https://web.archive.org/web/20231128115151/https://nvd.nist.gov/">https://nvd.nist.gov</a> </p> </div> <div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag"> <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> </div> <div> <div> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header" style="height:104px"> <a class="navbar-brand" href="https://web.archive.org/web/20231128115151/https://www.nist.gov/" target="_blank" id="navbar-brand-image" style="padding-top: 36px"> <img alt="National Institute of Standards and Technology" src="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/nist/nist-logo.svg" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span class="hidden-xxs">NVD </span>MENU</span> </a> </span> </div> </div> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/web/20231128115151/https://nvd.nist.gov/general"> General <span class="expander fa fa-plus" id="nvd-header-menu-general" data-expander-name="general" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="general"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20231128115151/https://nvd.nist.gov/general/nvd-dashboard">NVD Dashboard</a> </p> <p> <a href="/web/20231128115151/https://nvd.nist.gov/general/news">News</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20231128115151/https://nvd.nist.gov/general/email-list">Email List</a> </p> <p> <a href="/web/20231128115151/https://nvd.nist.gov/general/faq">FAQ</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20231128115151/https://nvd.nist.gov/general/visualizations">Visualizations</a> </p> <p> <a href="/web/20231128115151/https://nvd.nist.gov/general/legal-disclaimer">Legal Disclaimer</a> </p> </div> </div> </div></li> <li><a href="/web/20231128115151/https://nvd.nist.gov/vuln"> Vulnerabilities <span class="expander fa fa-plus" id="nvd-header-menu-vulnerabilities" data-expander-name="vulnerabilities" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="vulnerabilities"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20231128115151/https://nvd.nist.gov/vuln/search">Search & Statistics</a> </p> <p> <a href="/web/20231128115151/https://nvd.nist.gov/vuln/categories">Weakness Types</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20231128115151/https://nvd.nist.gov/vuln/data-feeds">Legacy Data Feeds</a> </p> <p> <a href="/web/20231128115151/https://nvd.nist.gov/vuln/vendor-comments">Vendor Comments</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20231128115151/https://nvd.nist.gov/vuln/cvmap">CVMAP</a> </p> </div> </div> </div></li> <li><a href="/web/20231128115151/https://nvd.nist.gov/vuln-metrics/cvss"> Vulnerability Metrics <span class="expander fa fa-plus" id="nvd-header-menu-metrics" data-expander-name="metrics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="metrics"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20231128115151/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator">CVSS V3 Calculator</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20231128115151/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator">CVSS V2 Calculator</a> </p> </div> <div class="col-lg-4"></div> </div> </div></li> <li><a href="/web/20231128115151/https://nvd.nist.gov/products"> Products <span class="expander fa fa-plus" id="nvd-header-menu-products" data-expander-name="products" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="products"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20231128115151/https://nvd.nist.gov/products/cpe">CPE Dictionary</a> </p> <p> <a href="/web/20231128115151/https://nvd.nist.gov/products/cpe/search">CPE Search</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20231128115151/https://nvd.nist.gov/products/cpe/statistics">CPE Statistics</a> </p> <p> <a href="/web/20231128115151/https://nvd.nist.gov/products/swid">SWID</a> </p> </div> <div class="col-lg-4"></div> </div> </div></li> <li> <a href="/web/20231128115151/https://nvd.nist.gov/developers">Developers<span class="expander fa fa-plus" id="nvd-header-menu-developers" data-expander-name="developers" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="developers"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20231128115151/https://nvd.nist.gov/developers/start-here">Start Here</a> </p> <p> <a href="/web/20231128115151/https://nvd.nist.gov/developers/request-an-api-key">Request an API Key</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20231128115151/https://nvd.nist.gov/developers/vulnerabilities">Vulnerabilities</a> </p> <p> <a href="/web/20231128115151/https://nvd.nist.gov/developers/products">Products</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20231128115151/https://nvd.nist.gov/developers/data-sources">Data Sources</a> </p> <p> <a href="/web/20231128115151/https://nvd.nist.gov/developers/terms-of-use">Terms of Use</a> </p> </div> </div> </div> </li> <li><a href="/web/20231128115151/https://nvd.nist.gov/info"> Contact NVD </a></li> <li><a href="/web/20231128115151/https://nvd.nist.gov/other"> Other Sites <span class="expander fa fa-plus" id="nvd-header-menu-othersites" data-expander-name="otherSites" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="otherSites"> <div class="row"> <div class="col-lg-4"> <p> <a href="https://web.archive.org/web/20231128115151/https://ncp.nist.gov/">Checklist (NCP) Repository</a> </p> <p> <a href="https://web.archive.org/web/20231128115151/https://ncp.nist.gov/cce">Configurations (CCE)</a> </p> <p> <a href="https://web.archive.org/web/20231128115151/https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a> </p> </div> <div class="col-lg-4"> <p> <a href="https://web.archive.org/web/20231128115151/https://csrc.nist.gov/projects/scap-validation-program">SCAP Validated Tools</a> </p> <p> <a href="https://web.archive.org/web/20231128115151/https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a> </p> </div> <div class="col-lg-4"> <p> <a href="https://web.archive.org/web/20231128115151/https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a> </p> </div> </div> </div></li> <li><a href="/web/20231128115151/https://nvd.nist.gov/search"> Search <span class="expander fa fa-plus" id="nvd-header-menu-search" data-expander-name="search" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="search"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20231128115151/https://nvd.nist.gov/vuln/search">Vulnerability Search</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20231128115151/https://nvd.nist.gov/products/cpe/search">CPE Search</a> </p> </div> </div> </div></li> </ul> </div> <!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <h2 class="hidden-xs hidden-sm"> <a href="https://web.archive.org/web/20231128115151/https://www.nist.gov/itl" target="_blank">Information Technology Laboratory</a> </h2> <h1 class="hidden-xs hidden-sm"> <a id="nvd-header-link" href="/web/20231128115151/https://nvd.nist.gov/">National Vulnerability Database</a> </h1> <h1 class="hidden-xs text-center hidden-md hidden-lg">National Vulnerability Database</h1> <h1 class="hidden-sm hidden-md hidden-lg text-center">NVD</h1> </div> <div class="col-sm-12 col-md-4"> <a style="width: 100%; text-align: center; display: block;padding-top: 14px"> <img id="img-logo-nvd-lg" alt="National Vulnerability Database" src="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/F_NIST-Logo-NVD-white.svg" width="500" height="100"> </a> </div> </div> </div> </section> </div> </div> </header> <main> <div> <div id="body-section" class="container"> <div class="row"> <ol class="breadcrumb"> <li><a href="/web/20231128115151/https://nvd.nist.gov/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li> </ol> </div> <div> <div> </div> <div id="vulnDetailPanel"> <table id="vulnDetailTableView" style="border-collapse: collapse;"> <tr> <td colspan="2"> <h2 data-testid="page-header"> <i class="fa fa-bug fa-flip-vertical"></i><span data-testid="page-header-vuln-id">CVE-2023-20533</span> Detail </h2> <div class="row"> <div class="col-lg-9 col-md-7 col-sm-12"> <h3 id="vulnDescriptionTitle" data-testid="vuln-description-title">Description </h3> <p data-testid="vuln-description">Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service. </p><br/> <div id="vulnCvssPanel" data-testid="vuln-cvss-container" class="row bs-callout bs-callout-success cvssVulnDetail"> <h3 style="display: inline" title="CVSS is not a measure of risk">Severity</h3>   <div id="cvssVulnDetailBtn" class="btn-group"> <button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x score" class="btn btn-active btn-lg cvssBtn" value="2.0">CVSS Version 3.x</button> <button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 score" class="btn btn-default btn-lg cvssBtn" value="3.x">CVSS Version 2.0</button> <br/> <br/> </div> <div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"> <strong>CVSS 3.x Severity and Metrics:</strong> <div class="row no-gutters"> <br/> <div class="col-lg-3 col-sm-6"> <div class="row"> <div class="col-lg-3 col-sm-6"> <img src="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/NVD_NVD_Stack_Plain.svg" class="cvssNvdIcon" alt="NIST CVSS score"> </div> <div class="col-lg-9 col-sm-6"> <strong>NIST:</strong> <span class="wrapData" data-testid="vuln-cvss3-source-nvd">NVD</span> </div> </div> </div> <div class="col-lg-3 col-sm-6"> <span><strong>Base Score:</strong> <span class="severityDetail"> <a id="Cvss3NistCalculatorAnchor" href="/web/20231128115151/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-20533&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST" data-testid="vuln-cvss3-panel-score" class="label label-danger">7.5 HIGH</a> </span></span> </div> <div class="col-lg-6 col-sm-12"> <span><strong>Vector:</strong> <span data-testid="vuln-cvss3-nist-vector" class="tooltipCvss3NistMetrics">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span></span> <input type="hidden" id="nistV3MetricHidden" value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>7.5 </span><span data-testid='vuln-cvssv3-base-score-severity'>HIGH</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 3.6 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 3.9 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Network </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> Low </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> None </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Unchanged </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> None </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> None </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> High </span> </p> </span> "/> </div> </div> <div id="cvss3FootNote" class="cvssFootNote"> <br/><br/> <span id="cvss3FootNoteSection"><i>NVD Analysts use publicly available information to associate vector strings and CVSS scores. We also display any CVSS information provided within the CVE List from the CNA.</i><br/><br/><i>Note: NVD Analysts have published a CVSS score for this CVE based on publicly available information at the time of analysis. The CNA has not provided a score within the CVE List.</i><br/><br/></span> </div> </div> <div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel" style="display: none"> <strong>CVSS 2.0 Severity and Metrics:</strong> <br/> <br/> <div class="row no-gutters"> <div class="col-lg-3 col-sm-6"> <div class="row"> <div class="col-lg-3 col-sm-6"> <img src="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/NVD_NVD_Stack_Plain.svg" class="cvssNvdIcon" alt="National Institute of Standards and Technology"> </div> <div class="col-lg-9 col-sm-6"> <strong>NIST:</strong> <span data-testid="vuln-cvss2-source-nvd">NVD</span> </div> </div> </div> <div class="col-lg-3 col-sm-6"> <span><strong>Base Score:</strong> <span class="severityDetail"><a id="Cvss2CalculatorAnchorNA" class="label label-default" data-testid="vuln-cvss2-panel-score-na" href="">N/A</a></span></span> </div> <div class="col-lg-6 col-sm-12"> <span><span data-testid="vuln-cvss2-panel-vector-na">NVD score not yet provided.</span></span> <input type="hidden" id="nistV2MetricHidden" value=""/> </div> </div> <div id="cvss2FootNote" class="cvssFootNote"> <br/><br/> <span id="cvss2FootNoteSection"><i>NVD Analysts use publicly available information to associate vector strings and CVSS scores. We also display any CVSS information provided within the CVE List from the CNA.</i><br/><br/><i>Note: NVD Analysts have not published a CVSS score for this CVE at this time. NVD Analysts use publicly available information at the time of analysis to associate CVSS vector strings.</i><br/><br/></span> </div> </div> </div> <div class="row col-sm-12"> <div id="vulnHyperlinksPanel"> <h3>References to Advisories, Solutions, and Tools</h3> <p> By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to <a href="https://web.archive.org/web/20231128115151/mailto:nvd@nist.gov">nvd@nist.gov</a>. </p> <table class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-hyperlinks-table"> <thead> <tr> <th>Hyperlink</th> <th>Resource</th> </tr> </thead> <tbody> <tr data-testid="vuln-hyperlinks-row-0"> <td data-testid="vuln-hyperlinks-link-0"><a href="https://web.archive.org/web/20231128115151/https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" target="_blank">https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002</a></td> <td data-testid="vuln-hyperlinks-resType-0"> <span> <span class="badge">Vendor Advisory</span> </span> </td> </tr> <tr data-testid="vuln-hyperlinks-row-1"> <td data-testid="vuln-hyperlinks-link-1"><a href="https://web.archive.org/web/20231128115151/https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" target="_blank">https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002</a></td> <td data-testid="vuln-hyperlinks-resType-1"> <span> <span class="badge">Vendor Advisory</span> </span> </td> </tr> </tbody> </table> </div> <div id="vulnTechnicalDetailsDiv" class="technicalDetails" data-testid="vuln-technical-details-container"> <h3>Weakness Enumeration</h3> <table class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-CWEs-table"> <thead> <tr> <th>CWE-ID</th> <th>CWE Name</th> <th>Source</th> </tr> </thead> <tbody> <tr data-testid="vuln-CWEs-row-0"> <td data-testid="vuln-CWEs-link-0"> <span>NVD-CWE-noinfo</span> </td> <td data-testid="vuln-CWEs-link-0">Insufficient Information</td> <td data-testid="vuln-cwes-assigner-0"> <span class="cweSource" data-testid="vuln-cwes-assigner-0-0"> <img src="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/NVD_NVD_Stack_Plain.svg" class="cweNvdIcon" alt="cwe source acceptance level"> <span>NIST </span> </span> </td> </tr> </tbody> </table> </div> <div> <h3> Known Affected Software Configurations <small> <a id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch to CPE 2.2</a></small> </h3> <span id="vulnConfigurationsArea"></span> <input type="hidden" id="cveIdHidden" value="CVE-2023-20533"/> <div> <div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div> <div id="vulnCpeTree" style="display: none;"></div> <input type="hidden" id="InputRestBasePath" value="/rest/public"> <input type="hidden" id="cveTreeJsonDataHidden" value="[{"id":1,"dataTestId":"vuln-software-config-1","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-1-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-1-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7232p_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7232p_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-0-0","id":"10063878","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554190","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-1-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7232p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7232p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-0","id":"10063879","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":2,"dataTestId":"vuln-software-config-2","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-2-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7252_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7252_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-0","id":"10063880","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554189","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7252%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7252:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-0","id":"10063881","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":3,"dataTestId":"vuln-software-config-3","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-3-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7262_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7262_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-0","id":"10063890","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554188","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7262%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7262:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-0","id":"10063891","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":4,"dataTestId":"vuln-software-config-4","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-4-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-4-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7272_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7272_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-0-0","id":"10063892","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554187","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-4-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7272%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7272:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-0","id":"10063893","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":5,"dataTestId":"vuln-software-config-5","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-5-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7282_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7282_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-0","id":"10063894","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554186","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7282%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7282:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-0","id":"10063895","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":6,"dataTestId":"vuln-software-config-6","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-6-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-6-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7302_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7302_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-0-0","id":"10063896","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554185","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-6-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7302%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7302:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-1-0","id":"10063897","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":7,"dataTestId":"vuln-software-config-7","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-7-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-7-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7302p_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7302p_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-7-0-0-0","id":"10063898","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554184","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-7-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7302p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7302p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-7-0-1-0","id":"10063899","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":8,"dataTestId":"vuln-software-config-8","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-8-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-8-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7352_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7352_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-0-0","id":"10063900","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554183","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-8-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7352%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7352:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-1-0","id":"10063901","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":9,"dataTestId":"vuln-software-config-9","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-9-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-9-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7402_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7402_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-0-0","id":"10063902","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554181","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-9-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7402%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7402:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-1-0","id":"10063903","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":10,"dataTestId":"vuln-software-config-10","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-10-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-10-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7402p_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7402p_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-0","id":"10063904","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554182","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-10-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7402p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7402p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-1-0","id":"10063905","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":11,"dataTestId":"vuln-software-config-11","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-11-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-11-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7452_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7452_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-0-0","id":"10063906","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554180","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-11-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7452%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7452:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-1-0","id":"10063907","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":12,"dataTestId":"vuln-software-config-12","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-12-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-12-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7502_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7502_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-12-0-0-0","id":"10063908","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554179","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-12-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7502%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7502:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-12-0-1-0","id":"10063909","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":13,"dataTestId":"vuln-software-config-13","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-13-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-13-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7502p_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7502p_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-13-0-0-0","id":"10063910","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554178","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-13-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7502p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7502p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-13-0-1-0","id":"10063911","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":14,"dataTestId":"vuln-software-config-14","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-14-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-14-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7532_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7532_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-14-0-0-0","id":"10063912","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554177","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-14-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7532%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7532:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-14-0-1-0","id":"10063913","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":15,"dataTestId":"vuln-software-config-15","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-15-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-15-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7542_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7542_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-15-0-0-0","id":"10063914","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554176","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-15-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7542%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7542:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-15-0-1-0","id":"10063915","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":16,"dataTestId":"vuln-software-config-16","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-16-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-16-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7552_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7552_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-16-0-0-0","id":"10063916","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554175","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-16-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7552%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7552:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-16-0-1-0","id":"10063917","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":17,"dataTestId":"vuln-software-config-17","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-17-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-17-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7642_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7642_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-17-0-0-0","id":"10063918","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554174","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-17-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7642%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7642:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-17-0-1-0","id":"10063919","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":18,"dataTestId":"vuln-software-config-18","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-18-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-18-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7662_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7662_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-18-0-0-0","id":"10063920","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554173","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-18-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7662%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7662:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-18-0-1-0","id":"10063921","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":19,"dataTestId":"vuln-software-config-19","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-19-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-19-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7702_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7702_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-19-0-0-0","id":"10063922","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554172","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-19-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7702%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7702:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-19-0-1-0","id":"10063923","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":20,"dataTestId":"vuln-software-config-20","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-20-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-20-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7702p_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7702p_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-20-0-0-0","id":"10063924","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554171","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-20-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7702p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7702p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-20-0-1-0","id":"10063925","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":21,"dataTestId":"vuln-software-config-21","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-21-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-21-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7742_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7742_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-21-0-0-0","id":"10063926","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554170","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-21-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7742%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7742:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-21-0-1-0","id":"10063927","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":22,"dataTestId":"vuln-software-config-22","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-22-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-22-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7f32_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7f32_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-22-0-0-0","id":"10063928","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554169","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-22-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7f32%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7f32:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-22-0-1-0","id":"10063929","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":23,"dataTestId":"vuln-software-config-23","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-23-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-23-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7f52_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7f52_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-23-0-0-0","id":"10063930","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554168","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-23-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7f52%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7f52:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-23-0-1-0","id":"10063931","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":24,"dataTestId":"vuln-software-config-24","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-24-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-24-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7f72_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7f72_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-24-0-0-0","id":"10063932","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554167","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-24-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7f72%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7f72:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-24-0-1-0","id":"10063933","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":25,"dataTestId":"vuln-software-config-25","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-25-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-25-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7h12_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7h12_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-25-0-0-0","id":"10063934","matchCpes":[],"rangeDescription":" versions up to (excluding) romepi_1.0.0.d ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"romepi_1.0.0.d","rangeId":"554215","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-25-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7h12%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7h12:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-25-0-1-0","id":"10063935","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":26,"dataTestId":"vuln-software-config-26","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-26-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-26-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7763_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7763_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-26-0-0-0","id":"10063936","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554086","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-26-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7763%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7763:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-26-0-1-0","id":"10063937","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":27,"dataTestId":"vuln-software-config-27","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-27-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-27-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7713p_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7713p_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-27-0-0-0","id":"10063938","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554084","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-27-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7713p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7713p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-27-0-1-0","id":"10063939","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":28,"dataTestId":"vuln-software-config-28","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-28-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-28-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7713_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7713_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-28-0-0-0","id":"10063940","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554083","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-28-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7713%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7713:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-28-0-1-0","id":"10063941","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":29,"dataTestId":"vuln-software-config-29","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-29-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-29-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7663p_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7663p_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-29-0-0-0","id":"10063942","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"626969","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-29-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7663p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7663p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-29-0-1-0","id":"10063943","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":30,"dataTestId":"vuln-software-config-30","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-30-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-30-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7663_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7663_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-30-0-0-0","id":"10063944","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554082","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-30-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7663%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7663:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-30-0-1-0","id":"10063945","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":31,"dataTestId":"vuln-software-config-31","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-31-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-31-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7643p_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7643p_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-31-0-0-0","id":"10063946","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"626970","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-31-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7643p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7643p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-31-0-1-0","id":"10063947","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":32,"dataTestId":"vuln-software-config-32","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-32-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-32-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7773x_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7773x_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-32-0-0-0","id":"10063948","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554087","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-32-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7773x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7773x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-32-0-1-0","id":"10063949","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":33,"dataTestId":"vuln-software-config-33","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-33-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-33-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7643_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7643_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-33-0-0-0","id":"10063950","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554081","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-33-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7643%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7643:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-33-0-1-0","id":"10063951","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":34,"dataTestId":"vuln-software-config-34","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-34-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-34-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7573x_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7573x_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-34-0-0-0","id":"10063952","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554079","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-34-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7573x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7573x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-34-0-1-0","id":"10063953","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":35,"dataTestId":"vuln-software-config-35","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-35-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-35-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_75f3_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_75f3_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-35-0-0-0","id":"10063954","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554080","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-35-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_75f3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_75f3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-35-0-1-0","id":"10063955","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":36,"dataTestId":"vuln-software-config-36","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-36-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-36-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7543p_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7543p_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-36-0-0-0","id":"10063956","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554078","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-36-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7543p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7543p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-36-0-1-0","id":"10063957","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":37,"dataTestId":"vuln-software-config-37","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-37-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-37-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7543_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7543_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-37-0-0-0","id":"10063958","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554077","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-37-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7543%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7543:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-37-0-1-0","id":"10063959","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":38,"dataTestId":"vuln-software-config-38","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-38-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-38-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7513_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7513_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-38-0-0-0","id":"10063960","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554076","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-38-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7513%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7513:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-38-0-1-0","id":"10063961","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":39,"dataTestId":"vuln-software-config-39","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-39-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-39-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7473x_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7473x_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-39-0-0-0","id":"10063962","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"626973","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-39-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7473x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7473x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-39-0-1-0","id":"10063963","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":40,"dataTestId":"vuln-software-config-40","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-40-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-40-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7453_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7453_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-40-0-0-0","id":"10063964","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554074","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-40-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7453%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7453:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-40-0-1-0","id":"10063965","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":41,"dataTestId":"vuln-software-config-41","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-41-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-41-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_74f3_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_74f3_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-41-0-0-0","id":"10063966","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554075","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-41-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_74f3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_74f3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-41-0-1-0","id":"10063967","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":42,"dataTestId":"vuln-software-config-42","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-42-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-42-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7443p_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7443p_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-42-0-0-0","id":"10063968","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554073","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-42-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7443p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7443p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-42-0-1-0","id":"10063969","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":43,"dataTestId":"vuln-software-config-43","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-43-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-43-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7443_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7443_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-43-0-0-0","id":"10063970","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554072","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-43-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7443%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7443:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-43-0-1-0","id":"10063971","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":44,"dataTestId":"vuln-software-config-44","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-44-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-44-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7413_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7413_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-44-0-0-0","id":"10063972","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554071","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-44-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7413%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7413:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-44-0-1-0","id":"10063973","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":45,"dataTestId":"vuln-software-config-45","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-45-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-45-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7373x_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7373x_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-45-0-0-0","id":"10063866","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554069","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-45-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7373x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7373x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-45-0-1-0","id":"10063867","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":46,"dataTestId":"vuln-software-config-46","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-46-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-46-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_73f3_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_73f3_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-46-0-0-0","id":"10063868","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554070","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-46-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_73f3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_73f3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-46-0-1-0","id":"10063869","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":47,"dataTestId":"vuln-software-config-47","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-47-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-47-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7343_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7343_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-47-0-0-0","id":"10063870","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554068","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-47-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7343%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7343:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-47-0-1-0","id":"10063871","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":48,"dataTestId":"vuln-software-config-48","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-48-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-48-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7313p_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7313p_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-48-0-0-0","id":"10063872","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554067","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-48-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7313p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7313p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-48-0-1-0","id":"10063873","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":49,"dataTestId":"vuln-software-config-49","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-49-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-49-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7313_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7313_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-49-0-0-0","id":"10063874","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554066","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-49-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7313%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7313:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-49-0-1-0","id":"10063875","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":50,"dataTestId":"vuln-software-config-50","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-50-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-50-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7303p_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7303p_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-50-0-0-0","id":"10063876","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"626974","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-50-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7303p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7303p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-50-0-1-0","id":"10063877","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":51,"dataTestId":"vuln-software-config-51","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-51-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-51-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7303_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7303_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-51-0-0-0","id":"10063882","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"626968","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-51-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7303%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7303:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-51-0-1-0","id":"10063883","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":52,"dataTestId":"vuln-software-config-52","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-52-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-52-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_72f3_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_72f3_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-52-0-0-0","id":"10063884","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"554065","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-52-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_72f3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_72f3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-52-0-1-0","id":"10063885","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":53,"dataTestId":"vuln-software-config-53","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-53-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-53-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7203p_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7203p_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-53-0-0-0","id":"10063886","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"626971","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-53-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7203p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7203p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-53-0-1-0","id":"10063887","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":54,"dataTestId":"vuln-software-config-54","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-54-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-54-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aepyc_7203_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:epyc_7203_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-54-0-0-0","id":"10063888","matchCpes":[],"rangeDescription":" versions up to (excluding) milanpi_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"milanpi_1.0.0.5","rangeId":"626972","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-54-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aepyc_7203%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:epyc_7203:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-54-0-1-0","id":"10063889","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":55,"dataTestId":"vuln-software-config-55","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-55-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-55-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_9_3950x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_9_3950x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-55-0-0-0","id":"10064098","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-55-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_9_3950x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_9_3950x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-55-0-1-0","id":"10064099","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":56,"dataTestId":"vuln-software-config-56","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-56-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-56-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_9_3900xt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_9_3900xt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-56-0-0-0","id":"10064100","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-56-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_9_3900xt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_9_3900xt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-56-0-1-0","id":"10064101","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":57,"dataTestId":"vuln-software-config-57","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-57-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-57-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_9_3900x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_9_3900x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-57-0-0-0","id":"10064102","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-57-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_9_3900x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_9_3900x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-57-0-1-0","id":"10064103","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":58,"dataTestId":"vuln-software-config-58","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-58-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-58-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_9_3900_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_9_3900_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-58-0-0-0","id":"10064104","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-58-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_9_3900%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_9_3900:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-58-0-1-0","id":"10064105","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":59,"dataTestId":"vuln-software-config-59","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-59-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-59-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_3800xt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_7_3800xt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-59-0-0-0","id":"10064061","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-59-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_3800xt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_7_3800xt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-59-0-1-0","id":"10064062","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":60,"dataTestId":"vuln-software-config-60","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-60-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-60-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_3800x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_7_3800x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-60-0-0-0","id":"10064063","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-60-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_3800x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_7_3800x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-60-0-1-0","id":"10064106","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":61,"dataTestId":"vuln-software-config-61","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-61-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-61-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_3700x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_7_3700x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-61-0-0-0","id":"10064107","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-61-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_3700x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_7_3700x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-61-0-1-0","id":"10064108","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":62,"dataTestId":"vuln-software-config-62","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-62-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-62-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_3600xt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_5_3600xt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-62-0-0-0","id":"10064064","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-62-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_3600xt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_5_3600xt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-62-0-1-0","id":"10064065","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":63,"dataTestId":"vuln-software-config-63","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-63-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-63-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_3600x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_5_3600x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-63-0-0-0","id":"10064066","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-63-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_3600x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_5_3600x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-63-0-1-0","id":"10064067","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":64,"dataTestId":"vuln-software-config-64","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-64-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-64-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_3600_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_5_3600_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-64-0-0-0","id":"10064068","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-64-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_3600%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_5_3600:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-64-0-1-0","id":"10064069","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":65,"dataTestId":"vuln-software-config-65","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-65-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-65-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_3500x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_5_3500x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-65-0-0-0","id":"10064070","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-65-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_3500x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_5_3500x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-65-0-1-0","id":"10064071","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":66,"dataTestId":"vuln-software-config-66","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-66-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-66-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_3500_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_5_3500_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-66-0-0-0","id":"10064072","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-66-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_3500%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_5_3500:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-66-0-1-0","id":"10064073","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":67,"dataTestId":"vuln-software-config-67","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-67-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-67-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_3_3300x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_3_3300x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-67-0-0-0","id":"10064074","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-67-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_3_3300x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_3_3300x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-67-0-1-0","id":"10064075","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":68,"dataTestId":"vuln-software-config-68","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-68-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-68-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_3_3100_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_3_3100_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-68-0-0-0","id":"10064076","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-68-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_3_3100%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_3_3100:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-68-0-1-0","id":"10064077","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":69,"dataTestId":"vuln-software-config-69","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-69-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-69-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_9_5950x_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_9_5950x_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-69-0-0-0","id":"10064078","matchCpes":[],"rangeDescription":" versions up to (excluding) comboam4v2_pi_1.2.0.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"comboam4v2_pi_1.2.0.9","rangeId":"626979","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-69-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_9_5950x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_9_5950x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-69-0-1-0","id":"10064079","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":70,"dataTestId":"vuln-software-config-70","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-70-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-70-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_9_5900x_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_9_5900x_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-70-0-0-0","id":"10064080","matchCpes":[],"rangeDescription":" versions up to (excluding) comboam4v2_pi_1.2.0.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"comboam4v2_pi_1.2.0.9","rangeId":"626980","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-70-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_9_5900x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_9_5900x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-70-0-1-0","id":"10064081","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":71,"dataTestId":"vuln-software-config-71","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-71-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-71-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_9_5900_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_9_5900_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-71-0-0-0","id":"10064082","matchCpes":[],"rangeDescription":" versions up to (excluding) comboam4v2_pi_1.2.0.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"comboam4v2_pi_1.2.0.9","rangeId":"626981","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-71-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_9_5900%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_9_5900:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-71-0-1-0","id":"10064083","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":72,"dataTestId":"vuln-software-config-72","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-72-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-72-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_5800x3d_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_7_5800x3d_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-72-0-0-0","id":"10064084","matchCpes":[],"rangeDescription":" versions up to (excluding) comboam4v2_pi_1.2.0.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"comboam4v2_pi_1.2.0.9","rangeId":"626982","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-72-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_5800x3d%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_7_5800x3d:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-72-0-1-0","id":"10064085","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":73,"dataTestId":"vuln-software-config-73","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-73-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-73-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_5800x_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_7_5800x_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-73-0-0-0","id":"10064086","matchCpes":[],"rangeDescription":" versions up to (excluding) comboam4v2_pi_1.2.0.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"comboam4v2_pi_1.2.0.9","rangeId":"626983","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-73-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_5800x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_7_5800x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-73-0-1-0","id":"10064087","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":74,"dataTestId":"vuln-software-config-74","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-74-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-74-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_5800_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_7_5800_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-74-0-0-0","id":"10064088","matchCpes":[],"rangeDescription":" versions up to (excluding) comboam4v2_pi_1.2.0.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"comboam4v2_pi_1.2.0.9","rangeId":"626984","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-74-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_5800%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_7_5800:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-74-0-1-0","id":"10064089","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":75,"dataTestId":"vuln-software-config-75","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-75-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-75-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_5700x_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_7_5700x_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-75-0-0-0","id":"10064090","matchCpes":[],"rangeDescription":" versions up to (excluding) comboam4v2_pi_1.2.0.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"comboam4v2_pi_1.2.0.9","rangeId":"626985","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-75-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_5700x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_7_5700x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-75-0-1-0","id":"10064091","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":76,"dataTestId":"vuln-software-config-76","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-76-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-76-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_5600x_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_5_5600x_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-76-0-0-0","id":"10064092","matchCpes":[],"rangeDescription":" versions up to (excluding) comboam4v2_pi_1.2.0.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"comboam4v2_pi_1.2.0.9","rangeId":"626986","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-76-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_5600x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_5_5600x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-76-0-1-0","id":"10064093","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":77,"dataTestId":"vuln-software-config-77","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-77-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-77-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_5600_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_5_5600_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-77-0-0-0","id":"10064094","matchCpes":[],"rangeDescription":" versions up to (excluding) comboam4v2_pi_1.2.0.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"comboam4v2_pi_1.2.0.9","rangeId":"626987","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-77-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_5600%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_5_5600:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-77-0-1-0","id":"10064095","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":78,"dataTestId":"vuln-software-config-78","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-78-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-78-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_5500_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_5_5500_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-78-0-0-0","id":"10064096","matchCpes":[],"rangeDescription":" versions up to (excluding) comboam4v2_pi_1.2.0.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"comboam4v2_pi_1.2.0.9","rangeId":"626988","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-78-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_5500%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_5_5500:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-78-0-1-0","id":"10064097","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":79,"dataTestId":"vuln-software-config-79","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-79-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-79-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_pro_3945wx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_threadripper_pro_3945wx_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-79-0-0-0","id":"10064215","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-79-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_pro_3945wx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_threadripper_pro_3945wx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-79-0-1-0","id":"10064204","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":80,"dataTestId":"vuln-software-config-80","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-80-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-80-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_pro_3955wx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_threadripper_pro_3955wx_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-80-0-0-0","id":"10064216","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-80-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_pro_3955wx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_threadripper_pro_3955wx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-80-0-1-0","id":"10064210","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":81,"dataTestId":"vuln-software-config-81","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-81-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-81-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_pro_3975wx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_threadripper_pro_3975wx_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-81-0-0-0","id":"10064218","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-81-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_pro_3975wx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_threadripper_pro_3975wx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-81-0-1-0","id":"10064214","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":82,"dataTestId":"vuln-software-config-82","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-82-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-82-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_pro_3995wx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_threadripper_pro_3995wx_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-82-0-0-0","id":"10064217","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-82-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_pro_3995wx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_threadripper_pro_3995wx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-82-0-1-0","id":"10064205","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":83,"dataTestId":"vuln-software-config-83","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-83-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-83-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_3960x_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_threadripper_3960x_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-83-0-0-0","id":"10064206","matchCpes":[],"rangeDescription":" versions up to (excluding) castlepeakpi-sp3r3_1.0.0.8 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"castlepeakpi-sp3r3_1.0.0.8","rangeId":"627048","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-83-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_3960x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_threadripper_3960x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-83-0-1-0","id":"10064207","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":84,"dataTestId":"vuln-software-config-84","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-84-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-84-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_3970x_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_threadripper_3970x_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-84-0-0-0","id":"10064208","matchCpes":[],"rangeDescription":" versions up to (excluding) castlepeakpi-sp3r3_1.0.0.8 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"castlepeakpi-sp3r3_1.0.0.8","rangeId":"627049","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-84-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_3970x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_threadripper_3970x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-84-0-1-0","id":"10064211","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":85,"dataTestId":"vuln-software-config-85","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-85-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-85-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_3990x_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_threadripper_3990x_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-85-0-0-0","id":"10064212","matchCpes":[],"rangeDescription":" versions up to (excluding) castlepeakpi-sp3r3_1.0.0.8 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"castlepeakpi-sp3r3_1.0.0.8","rangeId":"627051","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-85-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_3990x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_threadripper_3990x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-85-0-1-0","id":"10064201","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":86,"dataTestId":"vuln-software-config-86","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-86-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-86-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_pro_3995wx_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:amd:ryzen_threadripper_pro_3995wx_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-86-0-0-0","id":"10064311","matchCpes":[],"rangeDescription":" versions up to (excluding) chagallwspi-swrx8_1.0.0.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"chagallwspi-swrx8_1.0.0.5","rangeId":"626680","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-86-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_pro_3995wx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:amd:ryzen_threadripper_pro_3995wx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-86-0-1-0","id":"10064312","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]}]"/> <p id="vulnCpeInfo"> <small> <i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br/> <a href="https://web.archive.org/web/20231128115151/mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br/> </small> </p> <script src="/web/20231128115151js_/https://nvd.nist.gov/site-media/js/vulnerability/cpe-match.js" type="text/javascript"></script> <script src="/web/20231128115151js_/https://nvd.nist.gov/site-media/js/vulnerability/configurationListing.js" type="text/javascript"></script> </div> </div> <div id="vulnChangeHistoryDiv" data-testid="vuln-change-history-container"> <h3 id="VulnChangeHistorySection">Change History</h3> <small> 2 change records found <a href="#VulnChangeHistorySection" style="text-decoration: underline" id="changeHistoryToggle">show changes</a> </small> <div> <div class="vuln-change-history-container" style="display:none"> <h4> <strong><span data-testid="vuln-change-history-type-0">Initial Analysis by NIST</span> <span data-testid="vuln-change-history-date-0">11/27/2023 2:31:24 PM</span></strong> </h4> <table class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-change-history-table"> <thead> <tr> <th>Action</th> <th>Type</th> <th>Old Value</th> <th>New Value</th> </tr> </thead> <tbody> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.5 OR cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:* versions up to (excluding) romepi_1.0.0.d OR cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2_pi_1.2.0.9 OR cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2_pi_1.2.0.9 OR cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2_pi_1.2.0.9 OR cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2_pi_1.2.0.9 OR cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2_pi_1.2.0.9 OR cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2_pi_1.2.0.9 OR cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2_pi_1.2.0.9 OR cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2_pi_1.2.0.9 OR cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2_pi_1.2.0.9 OR cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2_pi_1.2.0.9 OR cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) castlepeakpi-sp3r3_1.0.0.8 OR cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) castlepeakpi-sp3r3_1.0.0.8 OR cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) castlepeakpi-sp3r3_1.0.0.8 OR cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) chagallwspi-swrx8_1.0.0.5 OR cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CPE Configuration</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>AND OR *cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CVSS V3.1</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Added</td> <td data-testid="vuln-change-history-0-type">CWE</td> <td data-testid="vuln-change-history-0-old"> </td> <td data-testid="vuln-change-history-0-new"> <pre>NIST NVD-CWE-noinfo</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Changed</td> <td data-testid="vuln-change-history-0-type">Reference Type</td> <td data-testid="vuln-change-history-0-old"> <pre>https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 No Types Assigned</pre> <br/> <br/> </td> <td data-testid="vuln-change-history-0-new"> <pre>https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 Vendor Advisory</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-0"> <td data-testid="vuln-change-history-0-action">Changed</td> <td data-testid="vuln-change-history-0-type">Reference Type</td> <td data-testid="vuln-change-history-0-old"> <pre>https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 No Types Assigned</pre> <br/> <br/> </td> <td data-testid="vuln-change-history-0-new"> <pre>https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 Vendor Advisory</pre> <br/> <br/> </td> </tr> </tbody> </table> </div> <div class="vuln-change-history-container" style="display:none"> <h4> <strong><span data-testid="vuln-change-history-type-1">New CVE Received by NIST</span> <span data-testid="vuln-change-history-date-1">11/14/2023 2:15:15 PM</span></strong> </h4> <table class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-change-history-table"> <thead> <tr> <th>Action</th> <th>Type</th> <th>Old Value</th> <th>New Value</th> </tr> </thead> <tbody> <tr data-testid="vuln-change-history-1"> <td data-testid="vuln-change-history-1-action">Added</td> <td data-testid="vuln-change-history-1-type">Description</td> <td data-testid="vuln-change-history-1-old"> </td> <td data-testid="vuln-change-history-1-new"> <pre>Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service. </pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-1"> <td data-testid="vuln-change-history-1-action">Added</td> <td data-testid="vuln-change-history-1-type">Reference</td> <td data-testid="vuln-change-history-1-old"> </td> <td data-testid="vuln-change-history-1-new"> <pre>Advanced Micro Devices Inc. https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 [No types assigned]</pre> <br/> <br/> </td> </tr> <tr data-testid="vuln-change-history-1"> <td data-testid="vuln-change-history-1-action">Added</td> <td data-testid="vuln-change-history-1-type">Reference</td> <td data-testid="vuln-change-history-1-old"> </td> <td data-testid="vuln-change-history-1-new"> <pre>Advanced Micro Devices Inc. https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 [No types assigned]</pre> <br/> <br/> </td> </tr> </tbody> </table> </div> </div> </div> </div> </div> <div class="col-lg-3 col-md-5 col-sm-12"> <div class="bs-callout bs-callout-info"> <h4>Quick Info</h4> <strong>CVE Dictionary Entry:</strong><br/> <a target="_blank" data-testid="vuln-cve-dictionary-entry" href="https://web.archive.org/web/20231128115151/https://cve.org/CVERecord?id=CVE-2023-20533">CVE-2023-20533</a><br/> <strong>NVD Published Date:</strong><br/> <span data-testid="vuln-published-on">11/14/2023</span><br/> <strong>NVD Last Modified:</strong><br/> <span data-testid="vuln-last-modified-on">11/27/2023</span><br/> <strong> Source:</strong><br/> <span data-testid="vuln-current-description-source">Advanced Micro Devices Inc.</span><br/> </div> </div> </div> </td> </tr> </table> </div> </div> </div> </div> </main> <footer id="footer" role="contentinfo"> <div class="container"> <div class="row"> <div class="col-sm-12"> <ul class="social-list pull-right"> <li class="field-item service-twitter list-horiz"><a href="https://web.archive.org/web/20231128115151/https://twitter.com/NISTCyber" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a></li> <li class="field-item service-facebook list-horiz"><a href="https://web.archive.org/web/20231128115151/https://www.facebook.com/NIST" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-linkedin list-horiz"><a href="https://web.archive.org/web/20231128115151/https://www.linkedin.com/company/nist" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-youtube list-horiz"><a href="https://web.archive.org/web/20231128115151/https://www.youtube.com/user/USNISTGOV" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-rss list-horiz"><a href="https://web.archive.org/web/20231128115151/https://www.nist.gov/news-events/nist-rss-feeds" target="_blank" class="social-btn social-btn--large extlink"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a></li> <li class="field-item service-govdelivery list-horiz last"><a href="https://web.archive.org/web/20231128115151/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a></li> </ul> <span class="hidden-xs"> <a title="National Institute of Standards and Technology" rel="home" class="footer-nist-logo"> <img src="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/nist/nist-logo.png" alt="National Institute of Standards and Technology logo"/> </a> </span> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://web.archive.org/web/20231128115151/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo"> <img src="/web/20231128115151im_/https://nvd.nist.gov/site-media/images/nist/nist-logo.png" alt="National Institute of Standards and Technology logo"/> </a> </div> </div> <div class="row footer-contact-container"> <div class="col-sm-6"> <strong>HEADQUARTERS</strong> <br> 100 Bureau Drive <br> Gaithersburg, MD 20899 <br> <a href="https://web.archive.org/web/20231128115151/tel:301-975-2000">(301) 975-2000</a> <br> <br> <a href="https://web.archive.org/web/20231128115151/mailto:nvd@nist.gov">Webmaster</a> | <a href="https://web.archive.org/web/20231128115151/https://www.nist.gov/about-nist/contact-us">Contact Us</a> | <a href="https://web.archive.org/web/20231128115151/https://www.nist.gov/about-nist/visit" style="display: inline-block;">Our Other Offices</a> </div> <div class="col-sm-6"> <div class="pull-right" style="text-align:right"> <strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong> <br> US-CERT Security Operations Center <br> Email: <a href="https://web.archive.org/web/20231128115151/mailto:soc@us-cert.gov">soc@us-cert.gov</a> <br> Phone: 1-888-282-0870 </div> </div> </div> <div class="row"> <nav title="Footer Navigation" role="navigation" class="row footer-bottom-links-container"> <!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html --> <p> <a href="https://web.archive.org/web/20231128115151/https://www.nist.gov/oism/site-privacy">Site Privacy</a> | <a href="https://web.archive.org/web/20231128115151/https://www.nist.gov/oism/accessibility">Accessibility</a> | <a href="https://web.archive.org/web/20231128115151/https://www.nist.gov/privacy">Privacy Program</a> | <a href="https://web.archive.org/web/20231128115151/https://www.nist.gov/oism/copyrights">Copyrights</a> | <a href="https://web.archive.org/web/20231128115151/https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a> | <a href="https://web.archive.org/web/20231128115151/https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a> | <a href="https://web.archive.org/web/20231128115151/https://www.nist.gov/foia">FOIA</a> | <a href="https://web.archive.org/web/20231128115151/https://www.nist.gov/environmental-policy-statement">Environmental Policy</a> | <a href="https://web.archive.org/web/20231128115151/https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a> | <a href="https://web.archive.org/web/20231128115151/https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a> | <a href="https://web.archive.org/web/20231128115151/https://www.commerce.gov/">Commerce.gov</a> | <a href="https://web.archive.org/web/20231128115151/https://www.science.gov/">Science.gov</a> | <a href="https://web.archive.org/web/20231128115151/https://www.usa.gov/">USA.gov</a> </p> </nav> </div> </div> </footer> </body> </html> <!-- FILE ARCHIVED ON 11:51:51 Nov 28, 2023 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 12:18:12 Feb 21, 2025. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.447 exclusion.robots: 0.022 exclusion.robots.policy: 0.013 esindex: 0.009 cdx.remote: 48.437 LoadShardBlock: 611.668 (3) PetaboxLoader3.datanode: 560.719 (4) load_resource: 290.81 PetaboxLoader3.resolve: 240.215 -->