|
84 | 84 | "defaultStatus": "unaffected"
|
85 | 85 | }
|
86 | 86 | ],
|
| 87 | + "cpeApplicability": [ |
| 88 | + { |
| 89 | + "operator": "AND", |
| 90 | + "nodes": [ |
| 91 | + { |
| 92 | + "operator": "OR", |
| 93 | + "negate": false, |
| 94 | + "cpeMatch": [ |
| 95 | + { |
| 96 | + "vulnerable": true, |
| 97 | + "criteria": "cpe:2.3:a:example_org:example_enterprise:*:*:*:*:*:*:*:*", |
| 98 | + "versionStartIncluding": "1.0.0", |
| 99 | + "versionEndExcluding": "1.0.6" |
| 100 | + }, |
| 101 | + { |
| 102 | + "vulnerable": true, |
| 103 | + "criteria": "cpe:2.3:a:example_org:example_enterprise:*:*:*:*:*:*:*:*", |
| 104 | + "versionStartIncluding": "2.1.6", |
| 105 | + "versionEndExcluding": "2.1.9" |
| 106 | + } |
| 107 | + ] |
| 108 | + }, |
| 109 | + { |
| 110 | + "operator": "OR", |
| 111 | + "negate": false, |
| 112 | + "cpeMatch": [ |
| 113 | + { |
| 114 | + "vulnerable": false, |
| 115 | + "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" |
| 116 | + }, |
| 117 | + { |
| 118 | + "vulnerable": false, |
| 119 | + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" |
| 120 | + }, |
| 121 | + { |
| 122 | + "vulnerable": false, |
| 123 | + "criteria": "cpe:2.3:h:some_company:xt-4500:*:*:*:*:*:*:*:*" |
| 124 | + } |
| 125 | + ] |
| 126 | + } |
| 127 | + ] |
| 128 | + } |
| 129 | + ], |
87 | 130 | "descriptions": [
|
88 | 131 | {
|
89 | 132 | "lang": "en",
|
90 |
| - "value": "OS Command Injection vulnerability parseFilename function of example.php in the Web Management Interface of Example.org Example Enterprise on Windows, macOS, and XT-4500 allows remote unauthenticated attackers to escalate privileges. This issue affects: 1.0 versions before 1.0.6, 2.1 versions from 2.16 until 2.1.9.", |
| 133 | + "value": "OS Command Injection vulnerability parseFilename function of example.php in the Web Management Interface of Example.org Example Enterprise on Windows, macOS, and XT-4500 allows remote unauthenticated attackers to escalate privileges. This issue affects: 1.0 versions before 1.0.6, 2.1 versions from 2.1.6 until 2.1.9.", |
91 | 134 | "supportingMedia": [
|
92 | 135 | {
|
93 | 136 | "type": "text/html",
|
94 | 137 | "base64": false,
|
95 |
| - "value": "OS Command Injection vulnerability <tt>parseFilename</tt> function of <tt>example.php</tt> in the Web Management Interface of Example.org Example Enterprise on Windows, macOS, and XT-4500 allows remote unauthenticated attackers to escalate privileges.<br><br>This issue affects:<br><ul><li>1.0 versions before 1.0.6</li><li>2.1 versions from 2.16 until 2.1.9.</li></ul>" |
| 138 | + "value": "OS Command Injection vulnerability <tt>parseFilename</tt> function of <tt>example.php</tt> in the Web Management Interface of Example.org Example Enterprise on Windows, macOS, and XT-4500 allows remote unauthenticated attackers to escalate privileges.<br><br>This issue affects:<br><ul><li>1.0 versions before 1.0.6</li><li>2.1 versions from 2.1.6 until 2.1.9.</li></ul>" |
96 | 139 | }
|
97 | 140 | ]
|
98 | 141 | },
|
99 | 142 | {
|
100 | 143 | "lang": "eo",
|
101 |
| - "value": "OS-komand-injekta vundebleco parseFilename funkcio de example.php en la Web Administrado-Interfaco de Example.org Example Enterprise \u0109e Windows, macOS kaj XT-4500 permesas al malproksimaj nea\u016dtentikigitaj atakantoj eskaladi privilegiojn. \u0108i tiu afero efikas: 1.0-versioj anta\u016d 1.0.6, 2.1-versioj de 2.16 \u011dis 2.1.9.", |
| 144 | + "value": "OS-komand-injekta vundebleco parseFilename funkcio de example.php en la Web Administrado-Interfaco de Example.org Example Enterprise \u0109e Windows, macOS kaj XT-4500 permesas al malproksimaj nea\u016dtentikigitaj atakantoj eskaladi privilegiojn. \u0108i tiu afero efikas: 1.0-versioj anta\u016d 1.0.6, 2.1-versioj de 2.1.6 \u011dis 2.1.9.", |
102 | 145 | "supportingMedia": [
|
103 | 146 | {
|
104 | 147 | "type": "text/html",
|
105 | 148 | "base64": false,
|
106 |
| - "value": "OS-komand-injekta vundebleco <tt>parseFilename</tt> funkcio de <tt>example.php</tt> en la Web Administrado-Interfaco de Example.org Example Enterprise \u0109e Windows, macOS kaj XT-4500 permesas al malproksimaj nea\u016dtentikigitaj atakantoj eskaladi privilegiojn.<br><br> \u0108i tiu afero efikas:<br><ul><li>1.0-versioj anta\u016d 1.0.6</li><li>2.1-versioj de 2.16 \u011dis 2.1.9.</li></ul>" |
| 149 | + "value": "OS-komand-injekta vundebleco <tt>parseFilename</tt> funkcio de <tt>example.php</tt> en la Web Administrado-Interfaco de Example.org Example Enterprise \u0109e Windows, macOS kaj XT-4500 permesas al malproksimaj nea\u016dtentikigitaj atakantoj eskaladi privilegiojn.<br><br> \u0108i tiu afero efikas:<br><ul><li>1.0-versioj anta\u016d 1.0.6</li><li>2.1-versioj de 2.1.6 \u011dis 2.1.9.</li></ul>" |
107 | 150 | }
|
108 | 151 | ]
|
109 | 152 | }
|
|
0 commit comments