Skip to content

Commit cc1c021

Browse files
authored
Update cnaContainer-advanced-example.json
Updated to include cpeApplicability example data
1 parent 0fe7a91 commit cc1c021

File tree

1 file changed

+47
-4
lines changed

1 file changed

+47
-4
lines changed

schema/docs/cnaContainer-advanced-example.json

+47-4
Original file line numberDiff line numberDiff line change
@@ -84,26 +84,69 @@
8484
"defaultStatus": "unaffected"
8585
}
8686
],
87+
"cpeApplicability": [
88+
{
89+
"operator": "AND",
90+
"nodes": [
91+
{
92+
"operator": "OR",
93+
"negate": false,
94+
"cpeMatch": [
95+
{
96+
"vulnerable": true,
97+
"criteria": "cpe:2.3:a:example_org:example_enterprise:*:*:*:*:*:*:*:*",
98+
"versionStartIncluding": "1.0.0",
99+
"versionEndExcluding": "1.0.6"
100+
},
101+
{
102+
"vulnerable": true,
103+
"criteria": "cpe:2.3:a:example_org:example_enterprise:*:*:*:*:*:*:*:*",
104+
"versionStartIncluding": "2.1.6",
105+
"versionEndExcluding": "2.1.9"
106+
}
107+
]
108+
},
109+
{
110+
"operator": "OR",
111+
"negate": false,
112+
"cpeMatch": [
113+
{
114+
"vulnerable": false,
115+
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
116+
},
117+
{
118+
"vulnerable": false,
119+
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
120+
},
121+
{
122+
"vulnerable": false,
123+
"criteria": "cpe:2.3:h:some_company:xt-4500:*:*:*:*:*:*:*:*"
124+
}
125+
]
126+
}
127+
]
128+
}
129+
],
87130
"descriptions": [
88131
{
89132
"lang": "en",
90-
"value": "OS Command Injection vulnerability parseFilename function of example.php in the Web Management Interface of Example.org Example Enterprise on Windows, macOS, and XT-4500 allows remote unauthenticated attackers to escalate privileges. This issue affects: 1.0 versions before 1.0.6, 2.1 versions from 2.16 until 2.1.9.",
133+
"value": "OS Command Injection vulnerability parseFilename function of example.php in the Web Management Interface of Example.org Example Enterprise on Windows, macOS, and XT-4500 allows remote unauthenticated attackers to escalate privileges. This issue affects: 1.0 versions before 1.0.6, 2.1 versions from 2.1.6 until 2.1.9.",
91134
"supportingMedia": [
92135
{
93136
"type": "text/html",
94137
"base64": false,
95-
"value": "OS Command Injection vulnerability <tt>parseFilename</tt> function of <tt>example.php</tt> in the Web Management Interface of Example.org Example Enterprise on Windows, macOS, and XT-4500 allows remote unauthenticated attackers to escalate privileges.<br><br>This issue affects:<br><ul><li>1.0 versions before 1.0.6</li><li>2.1 versions from 2.16 until 2.1.9.</li></ul>"
138+
"value": "OS Command Injection vulnerability <tt>parseFilename</tt> function of <tt>example.php</tt> in the Web Management Interface of Example.org Example Enterprise on Windows, macOS, and XT-4500 allows remote unauthenticated attackers to escalate privileges.<br><br>This issue affects:<br><ul><li>1.0 versions before 1.0.6</li><li>2.1 versions from 2.1.6 until 2.1.9.</li></ul>"
96139
}
97140
]
98141
},
99142
{
100143
"lang": "eo",
101-
"value": "OS-komand-injekta vundebleco parseFilename funkcio de example.php en la Web Administrado-Interfaco de Example.org Example Enterprise \u0109e Windows, macOS kaj XT-4500 permesas al malproksimaj nea\u016dtentikigitaj atakantoj eskaladi privilegiojn. \u0108i tiu afero efikas: 1.0-versioj anta\u016d 1.0.6, 2.1-versioj de 2.16 \u011dis 2.1.9.",
144+
"value": "OS-komand-injekta vundebleco parseFilename funkcio de example.php en la Web Administrado-Interfaco de Example.org Example Enterprise \u0109e Windows, macOS kaj XT-4500 permesas al malproksimaj nea\u016dtentikigitaj atakantoj eskaladi privilegiojn. \u0108i tiu afero efikas: 1.0-versioj anta\u016d 1.0.6, 2.1-versioj de 2.1.6 \u011dis 2.1.9.",
102145
"supportingMedia": [
103146
{
104147
"type": "text/html",
105148
"base64": false,
106-
"value": "OS-komand-injekta vundebleco <tt>parseFilename</tt> funkcio de <tt>example.php</tt> en la Web Administrado-Interfaco de Example.org Example Enterprise \u0109e Windows, macOS kaj XT-4500 permesas al malproksimaj nea\u016dtentikigitaj atakantoj eskaladi privilegiojn.<br><br> \u0108i tiu afero efikas:<br><ul><li>1.0-versioj anta\u016d 1.0.6</li><li>2.1-versioj de 2.16 \u011dis 2.1.9.</li></ul>"
149+
"value": "OS-komand-injekta vundebleco <tt>parseFilename</tt> funkcio de <tt>example.php</tt> en la Web Administrado-Interfaco de Example.org Example Enterprise \u0109e Windows, macOS kaj XT-4500 permesas al malproksimaj nea\u016dtentikigitaj atakantoj eskaladi privilegiojn.<br><br> \u0108i tiu afero efikas:<br><ul><li>1.0-versioj anta\u016d 1.0.6</li><li>2.1-versioj de 2.1.6 \u011dis 2.1.9.</li></ul>"
107150
}
108151
]
109152
}

0 commit comments

Comments
 (0)