id
stringlengths 13
16
| published
stringlengths 23
23
| descriptions
stringlengths 21
4k
| metrics
dict | references
listlengths 1
140
| configurations
listlengths 1
2.88k
| __index_level_0__
int64 0
135k
|
---|---|---|---|---|---|---|
CVE-2017-18462 | 2019-08-05T12:15:11.380 | cPanel before 62.0.17 allows a CPHulk one-day ban bypass when IP based protection is enabled (SEC-224). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47E22D10-EA36-41E7-9E6E-4225F1EAFBCA",
"versionEndExcluding": "56.0.46",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "318EEDB6-58C6-491A-B15E-5049D1B205D4",
"versionEndExcluding": "58.0.45",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F022EBEE-AA7C-49E7-8A8C-949533E383F6",
"versionEndExcluding": "60.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2270415F-4273-4951-8B94-02FB24BD73B5",
"versionEndExcluding": "62.0.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,314 |
CVE-2017-18464 | 2019-08-05T12:15:11.443 | cPanel before 62.0.17 allows arbitrary file-overwrite operations via the WHM Zone Template editor (SEC-226). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47E22D10-EA36-41E7-9E6E-4225F1EAFBCA",
"versionEndExcluding": "56.0.46",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "318EEDB6-58C6-491A-B15E-5049D1B205D4",
"versionEndExcluding": "58.0.45",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F022EBEE-AA7C-49E7-8A8C-949533E383F6",
"versionEndExcluding": "60.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2270415F-4273-4951-8B94-02FB24BD73B5",
"versionEndExcluding": "62.0.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,315 |
CVE-2017-18465 | 2019-08-05T12:15:11.537 | cPanel before 62.0.17 does not have a sufficient list of reserved usernames (SEC-227). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47E22D10-EA36-41E7-9E6E-4225F1EAFBCA",
"versionEndExcluding": "56.0.46",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "318EEDB6-58C6-491A-B15E-5049D1B205D4",
"versionEndExcluding": "58.0.45",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F022EBEE-AA7C-49E7-8A8C-949533E383F6",
"versionEndExcluding": "60.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2270415F-4273-4951-8B94-02FB24BD73B5",
"versionEndExcluding": "62.0.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,316 |
CVE-2017-18466 | 2019-08-05T12:15:11.583 | cPanel before 62.0.17 does not properly recognize domain ownership during addition of parked domains to a mail configuration (SEC-228). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47E22D10-EA36-41E7-9E6E-4225F1EAFBCA",
"versionEndExcluding": "56.0.46",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "318EEDB6-58C6-491A-B15E-5049D1B205D4",
"versionEndExcluding": "58.0.45",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F022EBEE-AA7C-49E7-8A8C-949533E383F6",
"versionEndExcluding": "60.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2270415F-4273-4951-8B94-02FB24BD73B5",
"versionEndExcluding": "62.0.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,317 |
CVE-2017-18467 | 2019-08-05T12:15:11.693 | cPanel before 62.0.17 allows access to restricted resources because of a URL filtering error (SEC-229). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47E22D10-EA36-41E7-9E6E-4225F1EAFBCA",
"versionEndExcluding": "56.0.46",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "318EEDB6-58C6-491A-B15E-5049D1B205D4",
"versionEndExcluding": "58.0.45",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F022EBEE-AA7C-49E7-8A8C-949533E383F6",
"versionEndExcluding": "60.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2270415F-4273-4951-8B94-02FB24BD73B5",
"versionEndExcluding": "62.0.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,318 |
CVE-2017-18468 | 2019-08-05T12:15:11.753 | cPanel before 62.0.17 allows demo accounts to execute code via the Htaccess::setphppreference API (SEC-232). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47E22D10-EA36-41E7-9E6E-4225F1EAFBCA",
"versionEndExcluding": "56.0.46",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "318EEDB6-58C6-491A-B15E-5049D1B205D4",
"versionEndExcluding": "58.0.45",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F022EBEE-AA7C-49E7-8A8C-949533E383F6",
"versionEndExcluding": "60.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2270415F-4273-4951-8B94-02FB24BD73B5",
"versionEndExcluding": "62.0.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,319 |
CVE-2019-14521 | 2019-08-05T12:15:11.863 | The api/admin/logoupload Logo File upload feature in EMCA Energy Logserver 6.1.2 allows attackers to send any kind of file to any location on the server via path traversal in the filename parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://energy-log-server-6x.readthedocs.io/en/latest/CHANGELOG.html"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://energylogserver.pl/en/"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/ahpaleus/effb46d4a9d9c2b9a452c98f64ddc2c7"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/emca-it/Energy-Log-Server-6.x/commits/master"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emca:energy_logserver:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "958A3C69-A41C-4D26-B44B-514CFD2ACE7B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,320 |
CVE-2019-14525 | 2019-08-05T12:15:11.957 | In Octopus Deploy 2019.4.0 through 2019.6.x before 2019.6.6, and 2019.7.x before 2019.7.6, an authenticated system administrator is able to view sensitive values by visiting a server configuration page or making an API call. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/5753"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/5754"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://octopus.com/downloads/compare?from=2019.6.6&to=2019.7.7"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A5A2242-AD63-4351-88F3-3126F21481F0",
"versionEndExcluding": "2019.6.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2019.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3442CC4-B93D-4D86-A051-3279A3E24D32",
"versionEndExcluding": "2019.7.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2019.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,321 |
CVE-2019-14662 | 2019-08-05T12:15:12.020 | Brandy 1.20.1 has a stack-based buffer overflow in fileio_openout in fileio.c via crafted BASIC source code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://sourceforge.net/p/brandy/bugs/7/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:brandy_project:brandy:1.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7089AF31-C710-4BE9-B637-A37853704588",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,322 |
CVE-2019-14663 | 2019-08-05T12:15:12.083 | Brandy 1.20.1 has a stack-based buffer overflow in fileio_openin in fileio.c via crafted BASIC source code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://sourceforge.net/p/brandy/bugs/6/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:brandy_project:brandy:1.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7089AF31-C710-4BE9-B637-A37853704588",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,323 |
CVE-2016-10767 | 2019-08-05T13:15:11.183 | cPanel before 60.0.25 allows stored XSS in the WHM Repair Mailbox Permissions interface (SEC-159). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://news.cpanel.com/cpanel-tsr-2016-0006-full-disclosure/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,324 |
CVE-2016-10768 | 2019-08-05T13:15:11.263 | cPanel before 60.0.25 allows file-overwrite operations during preparation for MySQL upgrades (SEC-161). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,325 |
CVE-2016-10769 | 2019-08-05T13:15:11.310 | cPanel before 60.0.25 allows an open redirect via /cgi-sys/FormMail-clone.cgi (SEC-162). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,326 |
CVE-2016-10770 | 2019-08-05T13:15:11.373 | cPanel before 60.0.25 allows arbitrary file-overwrite operations during a Roundcube update (SEC-164). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,327 |
CVE-2016-10771 | 2019-08-05T13:15:11.450 | cPanel before 60.0.25 allows file-create and file-chmod operations during ModSecurity Audit logfile processing (SEC-165). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,328 |
CVE-2016-10772 | 2019-08-05T13:15:11.497 | cPanel before 60.0.25 does not enforce feature-list restrictions when calling the multilang adminbin (SEC-168). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,329 |
CVE-2016-10773 | 2019-08-05T13:15:11.560 | cPanel before 60.0.25 allows format-string injection in exception-message handling (SEC-171). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,330 |
CVE-2016-10774 | 2019-08-05T13:15:11.607 | cPanel before 60.0.25 allows self XSS in the tail_ea4_migration.cgi interface (SEC-172). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://news.cpanel.com/cpanel-tsr-2016-0006-full-disclosure/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,331 |
CVE-2016-10775 | 2019-08-05T13:15:11.700 | cPanel before 60.0.25 allows arbitrary file-chown operations via reassign_post_terminate_cruft (SEC-173). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,332 |
CVE-2017-18469 | 2019-08-05T13:15:11.777 | cPanel before 62.0.17 allows demo accounts to execute code via an NVData_fetchinc API call (SEC-233). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47E22D10-EA36-41E7-9E6E-4225F1EAFBCA",
"versionEndExcluding": "56.0.46",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "318EEDB6-58C6-491A-B15E-5049D1B205D4",
"versionEndExcluding": "58.0.45",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F022EBEE-AA7C-49E7-8A8C-949533E383F6",
"versionEndExcluding": "60.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2270415F-4273-4951-8B94-02FB24BD73B5",
"versionEndExcluding": "62.0.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,333 |
CVE-2017-18470 | 2019-08-05T13:15:11.857 | cPanel before 62.0.4 has a fixed password for the Munin MySQL test account (SEC-196). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4B4DFA-B2D7-4EA7-A94A-8F60027FD024",
"versionEndExcluding": "11.54.0.36",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D11E1492-C7CE-42BA-A721-1163B4C9EA22",
"versionEndExcluding": "56.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8193ADD4-1299-49BA-AE70-F515F12D01D0",
"versionEndExcluding": "58.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCB32F8-DE9E-4C6E-9F5B-1629E53936B0",
"versionEndExcluding": "60.0.35",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "448BB5AF-3153-4957-A76B-04057E42C912",
"versionEndExcluding": "62.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,334 |
CVE-2017-18471 | 2019-08-05T13:15:11.920 | cPanel before 62.0.4 allows self XSS on the paper_lantern password-change screen (SEC-197). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://news.cpanel.com/tsr-2017-0001-full-disclosure/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4B4DFA-B2D7-4EA7-A94A-8F60027FD024",
"versionEndExcluding": "11.54.0.36",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D11E1492-C7CE-42BA-A721-1163B4C9EA22",
"versionEndExcluding": "56.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8193ADD4-1299-49BA-AE70-F515F12D01D0",
"versionEndExcluding": "58.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCB32F8-DE9E-4C6E-9F5B-1629E53936B0",
"versionEndExcluding": "60.0.35",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "448BB5AF-3153-4957-A76B-04057E42C912",
"versionEndExcluding": "62.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,335 |
CVE-2017-18472 | 2019-08-05T13:15:11.997 | cPanel before 62.0.4 allows reflected XSS in reset-password interfaces (SEC-198). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://news.cpanel.com/tsr-2017-0001-full-disclosure/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D11E1492-C7CE-42BA-A721-1163B4C9EA22",
"versionEndExcluding": "56.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8193ADD4-1299-49BA-AE70-F515F12D01D0",
"versionEndExcluding": "58.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCB32F8-DE9E-4C6E-9F5B-1629E53936B0",
"versionEndExcluding": "60.0.35",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "448BB5AF-3153-4957-A76B-04057E42C912",
"versionEndExcluding": "62.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,336 |
CVE-2017-18473 | 2019-08-05T13:15:12.060 | cPanel before 62.0.4 allows self XSS on the webmail Password and Security page (SEC-199). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://news.cpanel.com/tsr-2017-0001-full-disclosure/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4B4DFA-B2D7-4EA7-A94A-8F60027FD024",
"versionEndExcluding": "11.54.0.36",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D11E1492-C7CE-42BA-A721-1163B4C9EA22",
"versionEndExcluding": "56.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8193ADD4-1299-49BA-AE70-F515F12D01D0",
"versionEndExcluding": "58.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCB32F8-DE9E-4C6E-9F5B-1629E53936B0",
"versionEndExcluding": "60.0.35",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "448BB5AF-3153-4957-A76B-04057E42C912",
"versionEndExcluding": "62.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,337 |
CVE-2017-18474 | 2019-08-05T13:15:12.137 | cPanel before 62.0.4 allows arbitrary file-read operations via Exim valiases (SEC-201). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4B4DFA-B2D7-4EA7-A94A-8F60027FD024",
"versionEndExcluding": "11.54.0.36",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D11E1492-C7CE-42BA-A721-1163B4C9EA22",
"versionEndExcluding": "56.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8193ADD4-1299-49BA-AE70-F515F12D01D0",
"versionEndExcluding": "58.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCB32F8-DE9E-4C6E-9F5B-1629E53936B0",
"versionEndExcluding": "60.0.35",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "448BB5AF-3153-4957-A76B-04057E42C912",
"versionEndExcluding": "62.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,338 |
CVE-2017-18475 | 2019-08-05T13:15:12.200 | In cPanel before 62.0.4, Exim piped filters ran in the context of an incorrect user account when delivering to a system user (SEC-204). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4B4DFA-B2D7-4EA7-A94A-8F60027FD024",
"versionEndExcluding": "11.54.0.36",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D11E1492-C7CE-42BA-A721-1163B4C9EA22",
"versionEndExcluding": "56.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8193ADD4-1299-49BA-AE70-F515F12D01D0",
"versionEndExcluding": "58.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCB32F8-DE9E-4C6E-9F5B-1629E53936B0",
"versionEndExcluding": "60.0.35",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "448BB5AF-3153-4957-A76B-04057E42C912",
"versionEndExcluding": "62.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,339 |
CVE-2017-18476 | 2019-08-05T13:15:12.263 | Leech Protect in cPanel before 62.0.4 does not protect certain directories (SEC-205). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4B4DFA-B2D7-4EA7-A94A-8F60027FD024",
"versionEndExcluding": "11.54.0.36",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D11E1492-C7CE-42BA-A721-1163B4C9EA22",
"versionEndExcluding": "56.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8193ADD4-1299-49BA-AE70-F515F12D01D0",
"versionEndExcluding": "58.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCB32F8-DE9E-4C6E-9F5B-1629E53936B0",
"versionEndExcluding": "60.0.35",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "448BB5AF-3153-4957-A76B-04057E42C912",
"versionEndExcluding": "62.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,340 |
CVE-2017-18477 | 2019-08-05T13:15:12.327 | In cPanel before 62.0.4, Exim transports could execute in the context of the nobody account (SEC-206). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4B4DFA-B2D7-4EA7-A94A-8F60027FD024",
"versionEndExcluding": "11.54.0.36",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D11E1492-C7CE-42BA-A721-1163B4C9EA22",
"versionEndExcluding": "56.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8193ADD4-1299-49BA-AE70-F515F12D01D0",
"versionEndExcluding": "58.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCB32F8-DE9E-4C6E-9F5B-1629E53936B0",
"versionEndExcluding": "60.0.35",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "448BB5AF-3153-4957-A76B-04057E42C912",
"versionEndExcluding": "62.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,341 |
CVE-2017-18478 | 2019-08-05T13:15:12.373 | In cPanel before 62.0.4 incorrect ACL checks could occur in xml-api for Rearrange Account actions (SEC-207). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4B4DFA-B2D7-4EA7-A94A-8F60027FD024",
"versionEndExcluding": "11.54.0.36",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D11E1492-C7CE-42BA-A721-1163B4C9EA22",
"versionEndExcluding": "56.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8193ADD4-1299-49BA-AE70-F515F12D01D0",
"versionEndExcluding": "58.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCB32F8-DE9E-4C6E-9F5B-1629E53936B0",
"versionEndExcluding": "60.0.35",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "448BB5AF-3153-4957-A76B-04057E42C912",
"versionEndExcluding": "62.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,342 |
CVE-2017-18479 | 2019-08-05T13:15:12.450 | In cPanel before 62.0.4, WHM SSL certificate generation uses an unreserved e-mail address (SEC-209). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4B4DFA-B2D7-4EA7-A94A-8F60027FD024",
"versionEndExcluding": "11.54.0.36",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D11E1492-C7CE-42BA-A721-1163B4C9EA22",
"versionEndExcluding": "56.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8193ADD4-1299-49BA-AE70-F515F12D01D0",
"versionEndExcluding": "58.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCB32F8-DE9E-4C6E-9F5B-1629E53936B0",
"versionEndExcluding": "60.0.35",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "448BB5AF-3153-4957-A76B-04057E42C912",
"versionEndExcluding": "62.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,343 |
CVE-2017-18480 | 2019-08-05T13:15:12.513 | cPanel before 62.0.4 does not enforce account ownership for has_mycnf_for_cpuser WHM API calls (SEC-210). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4B4DFA-B2D7-4EA7-A94A-8F60027FD024",
"versionEndExcluding": "11.54.0.36",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D11E1492-C7CE-42BA-A721-1163B4C9EA22",
"versionEndExcluding": "56.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8193ADD4-1299-49BA-AE70-F515F12D01D0",
"versionEndExcluding": "58.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCB32F8-DE9E-4C6E-9F5B-1629E53936B0",
"versionEndExcluding": "60.0.35",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "448BB5AF-3153-4957-A76B-04057E42C912",
"versionEndExcluding": "62.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,344 |
CVE-2017-18481 | 2019-08-05T13:15:12.577 | cPanel before 62.0.4 allows stored XSS in the WHM Account Suspension List interface (SEC-211). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://news.cpanel.com/tsr-2017-0001-full-disclosure/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4B4DFA-B2D7-4EA7-A94A-8F60027FD024",
"versionEndExcluding": "11.54.0.36",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D11E1492-C7CE-42BA-A721-1163B4C9EA22",
"versionEndExcluding": "56.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8193ADD4-1299-49BA-AE70-F515F12D01D0",
"versionEndExcluding": "58.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCB32F8-DE9E-4C6E-9F5B-1629E53936B0",
"versionEndExcluding": "60.0.35",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "448BB5AF-3153-4957-A76B-04057E42C912",
"versionEndExcluding": "62.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,345 |
CVE-2017-18482 | 2019-08-05T13:15:12.747 | cPanel before 62.0.4 allows resellers to use the WHM enqueue_transfer_item API for queueing non-rearrange modules (SEC-213). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/62+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4B4DFA-B2D7-4EA7-A94A-8F60027FD024",
"versionEndExcluding": "11.54.0.36",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D11E1492-C7CE-42BA-A721-1163B4C9EA22",
"versionEndExcluding": "56.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8193ADD4-1299-49BA-AE70-F515F12D01D0",
"versionEndExcluding": "58.0.43",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCB32F8-DE9E-4C6E-9F5B-1629E53936B0",
"versionEndExcluding": "60.0.35",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "448BB5AF-3153-4957-A76B-04057E42C912",
"versionEndExcluding": "62.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "61.9999.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,346 |
CVE-2019-4261 | 2019-08-05T14:15:12.007 | IBM WebSphere MQ V7.1, 7.5, IBM MQ V8, IBM MQ V9.0LTS, IBM MQ V9.1 LTS, and IBM MQ V9.1 CD are vulnerable to a denial of service attack caused by specially crafted messages. IBM X-Force ID: 160013. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"VDB Entry",
"Vendor Advisory"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/160013"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10886887"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:mq:*:*:*:*:*:*:*:*",
"matchCriteriaId": "378FDA1D-6ED0-4A6E-84B9-02BF8AE8DCAE",
"versionEndExcluding": null,
"versionEndIncluding": "8.0.0.11",
"versionStartExcluding": null,
"versionStartIncluding": "8.0.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:mq:*:*:*:*:lts:*:*:*",
"matchCriteriaId": "CD1D619F-AE0C-44C3-805D-6BD11E2D8361",
"versionEndExcluding": null,
"versionEndIncluding": "9.0.0.6",
"versionStartExcluding": null,
"versionStartIncluding": "9.0.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:mq:*:*:*:*:continuous_delivery:*:*:*",
"matchCriteriaId": "019FF429-9C0B-4B5F-8C09-4581B436CC19",
"versionEndExcluding": null,
"versionEndIncluding": "9.1.2",
"versionStartExcluding": null,
"versionStartIncluding": "9.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:mq:*:*:*:*:lts:*:*:*",
"matchCriteriaId": "3B23C334-D8CC-4DF2-A292-D75D8B90E45E",
"versionEndExcluding": null,
"versionEndIncluding": "9.1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": "9.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_mq:*:*:*:*:*:*:*:*",
"matchCriteriaId": "608A2459-5996-492A-BE82-CD008CA35814",
"versionEndExcluding": null,
"versionEndIncluding": "7.1.0.9",
"versionStartExcluding": null,
"versionStartIncluding": "7.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_mq:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB8AA3EF-67B7-40CA-8FF0-27482CA5F5A5",
"versionEndExcluding": null,
"versionEndIncluding": "7.5.0.9",
"versionStartExcluding": null,
"versionStartIncluding": "7.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,347 |
CVE-2019-4284 | 2019-08-05T14:15:12.067 | IBM Cloud Private 2.1.0 , 3.1.0, 3.1.1, and 3.1.2 could allow a local privileged user to obtain sensitive OIDC token that is printed to log files, which could be used to log in to the system as another user. IBM X-Force ID: 160512. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"VDB Entry",
"Vendor Advisory"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/160512"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10885454"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:cloud_private:*:*:*:*:*:*:*:*",
"matchCriteriaId": "511384DA-852E-48C4-AECF-1C99A7CACD34",
"versionEndExcluding": null,
"versionEndIncluding": "2.1.0.3",
"versionStartExcluding": null,
"versionStartIncluding": "2.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:cloud_private:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8902916-DD7C-4F3B-9C64-EB692E7AB79A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:cloud_private:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "73189517-F9CF-4DB8-B48B-6D7DE87FD1F9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:cloud_private:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D04F7694-CC11-46BF-9FE0-EA2D93BC0FE1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,348 |
CVE-2019-4473 | 2019-08-05T14:15:12.130 | Multiple binaries in IBM SDK, Java Technology Edition 7, 7R, and 8 on the AIX platform use insecure absolute RPATHs, which may facilitate code injection and privilege elevation by local users. IBM X-Force ID: 163984. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=ibm10960422"
},
{
"source": "[email protected]",
"tags": [
"VDB Entry",
"Vendor Advisory"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/163984"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9A8BF650-B8F5-467E-8DBF-81788B55F345",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:7.1.4.50:*:*:*:*:*:*:*",
"matchCriteriaId": "5FD30AB3-E817-4A67-B411-011963DB4B0C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4DA5845-1740-41C3-8D73-F1E826784497",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,349 |
CVE-2019-14348 | 2019-08-05T15:15:11.433 | The BearDev JoomSport plugin 3.3 for WordPress allows SQL injection to steal, modify, or delete database information via the joomsport_season/new-yorkers/?action=playerlist sid parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/153963/WordPress-JoomSport-3.3-SQL-Injection.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://hackpuntes.com/cve-2019-14348-joomsport-for-sports-sql-injection/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://wpvulndb.com/vulnerabilities/9499"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:beardev:joomsport:3.3:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "C7472539-1D86-4A76-82CB-14E6B6E24528",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,350 |
CVE-2019-11270 | 2019-08-05T17:15:10.820 | Cloud Foundry UAA versions prior to v73.4.0 contain a vulnerability where a malicious client possessing the 'clients.write' authority or scope can bypass the restrictions imposed on clients created via 'clients.write' and create clients with arbitrary scopes that the creator does not possess. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 1,
"impactScore": 5.8,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://pivotal.io/security/cve-2019-11270"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.cloudfoundry.org/blog/cve-2019-11270"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pivotal_software:application_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EA028AB4-A389-41D4-997B-23DD70DC3025",
"versionEndExcluding": "2.3.15",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:application_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9103B5F4-870C-4629-871D-25DB2C96E6C6",
"versionEndExcluding": "2.4.11",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:application_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF7BA0B1-9C33-42F1-8ACA-6AE2EAC13F5B",
"versionEndExcluding": "2.5.7",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:application_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C687BD70-0109-4798-9B9D-C7BD35D601D5",
"versionEndExcluding": "2.6.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D95746D-026A-4B5A-BEDF-3218F10AF7F0",
"versionEndExcluding": "73.4.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:operations_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA8501AB-24B2-4A92-AEDD-2EE7CD852DB5",
"versionEndExcluding": "2.3.22",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:operations_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB30A404-6A76-4226-A224-12B6A8131A38",
"versionEndExcluding": "2.4.16",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:operations_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F0C15A4-76D8-4740-B5F6-70607C83A5DA",
"versionEndExcluding": "2.5.10",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal_software:operations_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0AF17FF-40DC-4FC6-B89B-4AE8C1372FD8",
"versionEndExcluding": "2.6.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,351 |
CVE-2019-3717 | 2019-08-05T17:15:10.883 | Select Dell Client Commercial and Consumer platforms contain an Improper Access Vulnerability. An unauthenticated attacker with physical access to the system could potentially bypass intended Secure Boot restrictions to run unsigned and untrusted code on expansion cards installed in the system during platform boot. Refer to https://www.dell.com/support/article/us/en/04/sln317683/dsa-2019-043-dell-client-improper-access-control-vulnerability?lang=en for versions affected by this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H",
"version": "3.0"
},
"exploitabilityScore": 0.5,
"impactScore": 6,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.dell.com/support/article/us/en/04/sln317683/dsa-2019-043-dell-client-improper-access-control-vulnerability?lang=en"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:chengming_3967:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA1096BA-28A8-4B1A-A5C7-1704A12E7636",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:chengming_3967_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D3DC8DC9-8AD8-45DB-A144-D9E6BB063EEF",
"versionEndExcluding": "1.5.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:chengming_3977:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67FCCE7C-BAC7-43F2-B328-C3AFD80B6AF0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:chengming_3977_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59E3249B-EC35-4631-BCDD-26999F857BFD",
"versionEndExcluding": "1.6.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:chengming_3980:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EDA1826-CCB2-48A6-B78E-CB608ED71B91",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:chengming_3980_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF239310-7E5B-4C0E-9BE8-9DC2AEFDDA0E",
"versionEndExcluding": "1.5.21",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:g3_3579:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F440E47-2C2A-4EA2-A799-649A23145D51",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:g3_3579_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5BAD2BF-051C-4F8A-B300-5A1C28FFF0A4",
"versionEndExcluding": "1.9.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:g3_3779:-:*:*:*:*:*:*:*",
"matchCriteriaId": "598A90E5-C7AE-4901-BD33-375F88CF09C4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:g3_3779_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62879862-913E-4D28-81E1-BC35F7582E73",
"versionEndExcluding": "1.9.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:g5_5587:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4274911B-43DC-4827-AB0D-314ACCE5B26A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:g5_5587_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE2A53FC-AD94-4372-B0C0-54532B413DFE",
"versionEndExcluding": "1.10.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:g5_5590_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "689EB61E-0FBA-47D3-9B67-D0444A0EBDBE",
"versionEndExcluding": "1.3.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:g5_5590:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9AA2CC-6E81-4987-A888-E82D2949EF3C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:g7_7588_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC5DC744-264B-448A-BD37-7397810A6EB0",
"versionEndExcluding": "1.10.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:g7_7588:-:*:*:*:*:*:*:*",
"matchCriteriaId": "269CF69F-0633-461A-A265-AB9728C40DA3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:g7_7590_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5A974FE-0B8B-4886-8AF8-2590B0FFA4D6",
"versionEndExcluding": "1.3.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:g7_7590:-:*:*:*:*:*:*:*",
"matchCriteriaId": "331F9E85-4F7F-4C28-A403-EE8D8476FC5E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:g7_7790_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A5A0A656-DFD1-46CC-8C27-3322A512F6CC",
"versionEndExcluding": "1.3.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:g7_7790:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE3DF41E-0328-4AE0-B755-8B6269185BE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:embedded_box_pc_5000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A92A4397-D3B4-4B10-9E7E-81BABA78A093",
"versionEndExcluding": "1.5.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:embedded_box_pc_5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7B2BE27-F109-4B11-8E8B-732A1AE3CC2F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3153_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2F99ED5A-ED9C-472A-886F-2BC5A377F4E2",
"versionEndExcluding": "1.22.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3153:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE59A3A8-72E6-49D7-9E3D-860443309870",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3158_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C4D0E10-AEDB-49EB-B213-ACF013ADAA40",
"versionEndExcluding": "1.22.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3158:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42CD0B09-5439-4E88-AF43-BAA281FE01F2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5368_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69AE9FC8-F59B-4202-9114-2F3334F55C27",
"versionEndExcluding": "1.19.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5368:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43449342-01B7-4AC2-A3AC-8597E64B3FB9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5378_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC75227C-D95C-45C5-934D-5058D30EBDF7",
"versionEndExcluding": "1.27.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5378:-:*:*:*:*:*:*:*",
"matchCriteriaId": "724DD9E8-B59A-4750-B8AD-52D7B20840E4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5379_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4675E9E8-8C1C-4200-93DC-FF97285007F0",
"versionEndExcluding": "1.11.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5379:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFFE840D-EE0C-4FA8-AB08-9879FC33DFB0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7353_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EA1057DA-9AF8-44E0-83A2-91DCB6FAA4DC",
"versionEndExcluding": "1.22.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7353:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B420B25C-3B08-4016-A382-F3FDF10A9732",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7359_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CDD97E7-2941-4028-8766-EEAF779BCE6C",
"versionEndExcluding": "1.22.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7359:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A523B22-2A24-4C00-B183-17277D276B34",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7368_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B8ADEA9-B7A6-4423-82EA-1932DD42CFED",
"versionEndExcluding": "1.19.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7368:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3A570D8-A9BE-4659-A992-4C7C7B0D9356",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7373_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F7C303C-535F-48A3-9587-2C87657A2AD1",
"versionEndExcluding": "1.13.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7373:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B77C8B4C-BEF4-49A1-80D6-8346DC9956A6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7378_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9796F68-237D-4D71-8F74-48A0A0597C65",
"versionEndExcluding": "1.27.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7378:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9827E7EE-BB51-4F66-852B-526BB446F479",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7370_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C173820-89A7-491A-8807-78AB54CBD4E8",
"versionEndExcluding": "1.13.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F94EA4A-4B45-48AD-861F-BFB86656A2A5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3459_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB51E25-161B-41D8-A886-2005C459ADEB",
"versionEndExcluding": "1.9.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3459:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCC9CABA-D37B-4AFB-AB73-4A7921295542",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3467_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83C31206-C295-4078-8B02-B50250A702F7",
"versionEndExcluding": "2.9.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3467:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF166EDA-DF83-4A2C-BBDC-59259DF53341",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3468_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B344CE9-4573-4F31-AD70-C1ADC8078994",
"versionEndExcluding": "1.12.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3468:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA0C89DC-B42A-496C-96DB-E3D43693F4DC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5468_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5AB1DBAA-0B55-4C89-A0D6-AE5360245743",
"versionEndExcluding": "1.9.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5468:-:*:*:*:*:*:*:*",
"matchCriteriaId": "653A3886-538C-4363-B22F-5332AA3914B6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7460_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8BB1A1E-BBD2-4A81-AC70-F911E8ADCD53",
"versionEndExcluding": "1.10.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7460:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FFB8D95-2938-4B40-BA59-32BC194B5DC6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7466_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56129325-757A-43B2-88FA-0451EA4BDE63",
"versionEndExcluding": "1.4.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7466:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD33157D-0C07-48AA-84C9-1567D50D4A7C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7467_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "93926E18-076A-4F8B-8FCA-7ED8AB19A734",
"versionEndExcluding": "1.9.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7467:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE26B68-8267-4EE8-812D-4E24E88BFA0D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3458_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9257FAF5-4365-470A-831E-C82402162C3C",
"versionEndExcluding": "a18",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3458:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C62BCDC-FEF6-4838-92FE-F20EA6EB0603",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3559_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE28F468-A931-4E73-BF4F-B5FDC91363B6",
"versionEndExcluding": "1.9.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3559:-:*:*:*:*:*:*:*",
"matchCriteriaId": "503421AE-D41C-49A4-AAA1-CAE8BE68D0FD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3567_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A7F189CC-62A4-49C1-8608-8F9CADB12717",
"versionEndExcluding": "2.9.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3567:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AAAFA5B-93F3-4214-A2A2-E62CD3A4041D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3568_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5686F72-F874-4BCF-81CF-729726432F64",
"versionEndExcluding": "1.12.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3568:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACC68041-0F9A-435C-BC6F-6D60241FB799",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5566_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95E60EF5-D58C-41CC-B8B4-5ADDE0CD3D15",
"versionEndExcluding": "1.9.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5566:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9199F4B-0F05-4C41-A57B-3FAE3C3C2919",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5567_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CB083A6-8022-4DEF-9312-519B65A2B506",
"versionEndExcluding": "1.2.7",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5567:-:*:*:*:*:*:*:*",
"matchCriteriaId": "808537AC-E25B-45A0-B446-0A1644015493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7560_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9268FA45-7F6F-4125-836F-6E4FDB4CC587",
"versionEndExcluding": "1.10.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7560:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E37FDD09-94A3-4820-8900-E9423D6464F2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5568_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF1EE5D1-6EED-4DA2-AE03-FCAFB39A1FB3",
"versionEndExcluding": "1.19.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5568:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D8B8DD6-4D2C-49F3-BDB0-F775C4C5DF31",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5578_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D06D0906-3305-4B35-AD3B-9AE0FFB0A06E",
"versionEndExcluding": "1.27.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5578:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2045E767-2574-49E3-9568-54E0475102FA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5579_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "17E57FAE-8AC1-4BC5-94D6-148787E92A37",
"versionEndExcluding": "1.11.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5579:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DDEA151-A57D-415C-A204-92C20E9CE3C0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7568_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A7871FF6-286F-4307-A6C5-932DB8BA0202",
"versionEndExcluding": "1.22.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7568:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED4B7F27-AE07-4A9F-A328-D05FA1C876DE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7569_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "971CBB2A-9C64-4A09-A2FA-67FFE73084F6",
"versionEndExcluding": "1.19.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7569:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5680427-C751-4369-AF26-B3CC548370F4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7573_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D49FC993-B698-4D31-8EB0-8AEEEDFA50C7",
"versionEndExcluding": "1.13.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7573:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6059015-DC40-4ECD-A1FC-FF65F41A2D2D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7579_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4ACC6DDE-59E0-46E8-8761-3471C6C5479B",
"versionEndExcluding": "1.27.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7579:-:*:*:*:*:*:*:*",
"matchCriteriaId": "571ED009-0B17-4B3A-AC18-4463B3DC2EA8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7570_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBA2D6BE-2355-4D12-A1E0-4F5EB18A3DBE",
"versionEndExcluding": "1.13.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57FC0E5C-8530-479A-AB4B-DDB694845CA2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7566_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B7578C-F1ED-46AC-8933-C3E6C4C47322",
"versionEndExcluding": "1.4.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7566:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DBE7DC8-78DF-4609-AD09-DBE463C6F478",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7567_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F704D87E-4B7D-4B84-BA63-7F0AA971620B",
"versionEndExcluding": "1.9.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7567:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89F57224-0DA9-447A-96CD-E87338C8B001",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7577_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5016A55-54E6-4C9D-A1C7-A3D924B9A23C",
"versionEndExcluding": "1.7.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7577:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C828C7-A504-4848-BAEB-005AFACF69C9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3558_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "435E96C6-BA94-4720-8407-6A28A91CAECB",
"versionEndExcluding": "a18",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3558:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FE17F58-7ADB-467C-B265-9D90F42FAC89",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5767_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC45C442-968E-4994-820A-AD2DF6876B79",
"versionEndExcluding": "1.2.7",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5767:-:*:*:*:*:*:*:*",
"matchCriteriaId": "730907F5-DE8C-404C-8E83-52A6F6388BD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7773_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92039D66-ACA1-4A7A-AC62-CD202CF64F5C",
"versionEndExcluding": "1.11.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7773:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F059017-2906-4952-929A-2A5F11601D92",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7778_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03085BE9-EAF6-4088-83BF-BA9F67C23027",
"versionEndExcluding": "1.19.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7778:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BC39E79-878E-4DDD-9A4C-076DC99A0711",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7779_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E6FB3BD-8A24-413D-BDB7-8D4FB2567309",
"versionEndExcluding": "1.27.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7779:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A3CC71C-E9C0-4B96-BEBF-826698A68FC5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3268_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9E4ACAB9-F3D4-40F7-B50C-98AD0AC63FAE",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3268:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C032B99E-E74F-4064-9A41-9A1D8579E9E1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3470_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9477E982-0620-4C44-A890-935F21A60BFA",
"versionEndExcluding": "1.5.21",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6606A288-CF9B-4BB6-9DC9-C73AD5C0FAF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3476_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E7CC0D2-7443-484A-A3BD-2771537AE4DC",
"versionEndExcluding": "1.7.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3476:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0421B71-D23E-4D08-938E-1863CE4BEFAE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3480_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24AC34CD-23DD-4F07-8747-8977251C73C9",
"versionEndExcluding": "1.4.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3480:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6042A01C-7F09-4755-A0AA-03476C48DAC0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3481_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD3938F-98D9-4FD0-BF12-561F2D0CA1D5",
"versionEndExcluding": "1.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3481:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82624B4C-8B81-4293-B323-E39EF4C7446D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3576_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D616FF-96A0-47EA-BEDE-A52F3A5DD16F",
"versionEndExcluding": "1.7.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3576:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6820AC15-5F8F-44EC-8164-2E74DDBC350D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3580_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A662A1CD-140F-45BB-95E4-377759CA0BB4",
"versionEndExcluding": "1.4.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35EEA72D-94E6-4AB1-83F7-4625681B482E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3583_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14E739BB-A9E2-41F6-B43A-234F66416F70",
"versionEndExcluding": "1.4.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3583:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19338A85-279E-43A6-8250-AE8D02C30346",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3581_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F20019E-04C0-43BB-9702-9A729BE8F0F9",
"versionEndExcluding": "1.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3581:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD9DAC31-8634-4D35-922A-616D966DC761",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3584_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2458963-E713-41D6-B15B-EC6520AA970A",
"versionEndExcluding": "1.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3584:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2CF2850-1C50-4AF4-A9F1-E23A9B963FFE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3668_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C433C3-F2C3-4D01-B8A6-B6ED2074E63C",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3668:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06E76A77-E526-496E-8612-C4973DB05476",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_670_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4233358C-558C-488D-ADE0-8A2D37502F77",
"versionEndExcluding": "1.5.21",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "253867B0-6E2B-4916-96E2-334650A01F40",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3780_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA98CFD-AB09-4275-B955-BFF35095701F",
"versionEndExcluding": "1.4.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3780:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D448145A-3F54-4EFA-B37F-E498F93C3F4C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_3781_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "12E4DE92-F9AC-43B2-A9A8-B51011DB573C",
"versionEndExcluding": "1.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_3781:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE61F5A3-CC20-4604-9903-8C6A83CEAB2D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5370_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "61F5474C-4AAA-42DB-8A1D-BE9EA1FC6C6B",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "961CEE09-A238-43E1-856D-290874EED48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5457_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31CC771D-5D67-48D9-9359-A5F8175E9E4E",
"versionEndExcluding": "1.6.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5457:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFB20D67-E71E-4FF3-9917-F25D6437F339",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5458_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "250A7DD1-03BE-4D0B-A93B-DA1A75CC5E13",
"versionEndExcluding": "a17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5458:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A1D120E-B8DF-4CB2-AEBD-9C1E0177E053",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5459_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D5CF72D9-89D1-4F11-A77D-C9F946F082EC",
"versionEndExcluding": "1.7.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5459:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A53A39D-9F0F-4502-81FC-CB705425B0F9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5480_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD4A344-C8BC-42FD-924E-4129984E62EC",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5480:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B8F925B-4D9C-4578-989A-2046363623EF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5481_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31282F2A-ABCF-4CCF-92BF-97157E65CD7B",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5481:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2889F415-6B65-4E5C-87F3-0D8D4A41C148",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5482_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ECA4D82F-F14B-4251-8BF7-9A58BBB16A36",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5482:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A949966-CD03-48FC-B3FD-ABB924CFBCF1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5557_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE658901-6372-4BC4-9A9D-D7E9EC9AC1F0",
"versionEndExcluding": "1.6.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5557:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21A1BA77-92BC-4987-8853-21E2BC38A4E9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5558_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "847F3221-8325-4770-ADD6-4DD4F81BE139",
"versionEndExcluding": "a17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5558:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09A73736-6F30-4504-A312-B80288D84426",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5559_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1090415E-4F1C-4B36-BE01-08DA535901E2",
"versionEndExcluding": "1.7.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5559:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E5B9B7-DAAD-449F-BC17-FFA070DCC6A6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5570_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C0CF05D0-FCE2-45C4-9BCB-74E89E57039F",
"versionEndExcluding": "1.2.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70FA90D2-6A18-4D7E-ACE9-4DC16355FB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5580_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B81A21E-A277-45B5-84C5-6336669485DD",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0402872-3BBB-49B6-9868-9BBEB6D58324",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5582_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1AB5B41-345F-47F3-B3A7-6E2B63540A0C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5582:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A843DC2B-F5B0-4FC0-9C1D-0C94DD87B0B7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5758_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "72464892-2607-443A-AF96-82B9533C0E09",
"versionEndExcluding": "a17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5758:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06F73FCB-9E4C-4BD9-83A4-FFB2D9401A5E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5759_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D41E24E8-100F-455D-BFB4-4B6320E319BF",
"versionEndExcluding": "1.7.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5759:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F64E55B-0993-4FAD-A5A4-5D5D293B2EF4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_5770_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DD9FF749-F51E-485E-AFC5-5629FD35D1CF",
"versionEndExcluding": "1.2.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_5770:-:*:*:*:*:*:*:*",
"matchCriteriaId": "446F85CB-1752-4C2D-AC6C-CD70AC9734CA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7380_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFCAB46-8FC1-4E7C-90EF-20F7DC2040F2",
"versionEndExcluding": "1.6.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "359576AF-ADB5-4363-92E9-BD1858C55035",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7386_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB4F3AA3-A56C-4681-988D-025F9BB7F36B",
"versionEndExcluding": "1.4.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7386:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A309CA69-6340-4971-88D9-06FA297BD79B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7472_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D2F8556-170C-40DE-85A8-34F3D44E394B",
"versionEndExcluding": "1.1.9",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7472:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F358875-D321-4744-B581-08F63121EFCC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7572_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE510FC9-85FE-4BB4-AF5B-80A40378D9F3",
"versionEndExcluding": "1.1.9",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7572:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD9E90A0-D8B0-4142-9620-179B8CB1E31F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7580_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1341533-7575-466F-B9DD-3AF47A0D4911",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FAD0E06-C2F4-4F21-BDE2-3379D35C823A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7586_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C03ED571-40EA-4AF1-94A8-1A2B4921050E",
"versionEndExcluding": "1.4.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7586:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F56A819-2DA6-41D8-A096-419C54F5B745",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:inspiron_7786_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40C6207B-E222-4DA5-AB59-D358C4FD3B7C",
"versionEndExcluding": "1.4.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:inspiron_7786:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69679DBF-3940-48BA-9FA5-953A09E09539",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3150_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F6D1D08-7C64-4FA0-91CE-778C10F9FE3C",
"versionEndExcluding": "a10",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1572D80-7941-47A4-8515-38EE39908A19",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3160_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94BD23E2-2EA8-4C34-A3D8-EDD89528069A",
"versionEndExcluding": "a12",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3160:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7655AF2-66FB-4938-BE95-6FF4B53EC8E8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3180_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E040A07-EC90-467E-AE91-F0F1C076809A",
"versionEndExcluding": "1.7.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3180:-:*:*:*:*:*:*:*",
"matchCriteriaId": "895D6AD5-908B-489C-95D7-874914192722",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3189_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2216EC3-C220-4B84-B421-2B4B060FEB8B",
"versionEndExcluding": "1.7.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3189:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A72CD347-8420-4309-82A4-BC8F79DC04AB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3190_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19E10B52-C477-426D-A438-56725C624D32",
"versionEndExcluding": "1.6.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3190:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4CC5BE-E3CB-4874-BAC6-3D37F1130EDF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3350_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4141A679-FB47-41AF-BEF4-BD1457B501A5",
"versionEndExcluding": "a15",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8494F070-7280-47CD-A750-183C7EB3E03F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3379_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BFD1711D-A7D7-4A91-8958-0C85B54DF8CE",
"versionEndExcluding": "1.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3379:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6CB0C83-2E19-40AF-B760-4D9DCC0377AD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3380_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3CA38BFB-679F-4122-8C31-A9A6A44DF09B",
"versionEndExcluding": "1.9.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2F30B90-E9E9-46CD-BFB0-459FC8723ADD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3390_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ECFD414A-7F77-46F1-9D97-A595DB4D0B45",
"versionEndExcluding": "1.8.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBD65603-294E-4164-98A5-118FE450F5D3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3450_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F99DBAC9-0A61-4E7E-90FD-A17516D1DE0A",
"versionEndExcluding": "a19",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C087B85D-2F09-49E5-8BE9-DE724B7D5BFB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3460_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "146A1111-FDF0-4DD7-85E2-A18DD611156F",
"versionEndExcluding": "a15",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3460:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10419F2B-8A07-4C4E-BA88-5465137EC10E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3470_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C375DDA-0091-409B-B79B-AD6F613075F7",
"versionEndExcluding": "1.14.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB10D00C-D600-4DE6-A0AB-DEB9C4FCC436",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3480_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60348047-4C85-4CB4-A2A7-CB398BAC6767",
"versionEndExcluding": "1.11.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3480:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04009AD7-3BE3-4C94-8DBE-FD72879BD916",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3490_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1570A84D-19D3-4C3F-AE60-70FC4E488120",
"versionEndExcluding": "1.9.7",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3490:-:*:*:*:*:*:*:*",
"matchCriteriaId": "393619AF-08ED-42B7-A0CF-B30AF00245A3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3550_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "296DA637-5466-40F4-8D8B-3C16BBD06F67",
"versionEndExcluding": "a19",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C8FB1C2-A4B9-496F-927E-90D8B0085741",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3560_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28B56674-9BCB-4491-A3F9-3DD4871F4F99",
"versionEndExcluding": "a15",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3560:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A95D40B-D42C-449E-915C-83A21EEA496B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3570_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "97D189B4-D138-487F-B567-988D77A547B0",
"versionEndExcluding": "1.14.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A13B996-2556-4899-8B7D-E3B1470445E9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3580_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14A30A9A-CAF1-4669-A6F1-633491076783",
"versionEndExcluding": "1.11.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3351403-5904-480C-B9E1-6A2DF39B7431",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_3590_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67DEDD7B-C724-41B1-A700-ADD0D3080A4A",
"versionEndExcluding": "1.9.7",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3590:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1B63755-2294-4DDA-B307-9E1722440F4D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5175_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1FDE3BE1-01CA-401F-B85E-F98A4B129ACC",
"versionEndExcluding": "1.5.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5175:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F69BD502-6FBA-4075-A427-2C0C546B3843",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5179_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D02A40-D65D-4DB1-9BA7-93660FBE1647",
"versionEndExcluding": "1.5.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5179:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE04752-0600-46B5-B7CF-74E160C8FC3F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5250_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "727BCF2C-CB87-4C6F-A978-B3302437FFD9",
"versionEndExcluding": "a21",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D77B20B-6FDB-4CB4-96CB-5A311891D13B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5280_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A9F51212-161E-4DC2-946B-B4D36A788553",
"versionEndExcluding": "1.14.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CD444B0-06AC-4115-9BD1-F65BF4E0D73E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5285_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "101B9C6E-1BE5-4ED6-886C-7EC00FDD6D71",
"versionEndExcluding": "1.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5285:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC433AB-F63C-46B7-B208-33A65E400CC4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5288_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "964FD691-43A3-48B4-8759-B0B50F4566CD",
"versionEndExcluding": "1.14.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5288:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B91BC7B8-1B63-4EE2-B855-93677363124C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5289_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C372D2-A617-4600-B0A4-45528B455BC0",
"versionEndExcluding": "1.17.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5289:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0DE99B6-291B-4AAB-BBF2-A0ADE238FCDD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5290_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "665C7A92-AA74-40CC-8DBD-2BB2E18E5ABE",
"versionEndExcluding": "1.8.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62EA01E4-0ADF-4863-9AE3-A9995581201E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69D384ED-60D6-4F30-BFA8-B24263713598",
"versionEndExcluding": "1.7.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5290_2-in-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB2E9C0-3EF7-4910-82A2-558AE08DC55C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5414_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A02C0F-A7FB-41C9-95C6-1BDD32F898CD",
"versionEndExcluding": "1.23.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5414:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CD83B0F-832B-4558-B747-E649276AE968",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5420_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3206EAE7-7D74-47B5-B581-B885000DBCFF",
"versionEndExcluding": "1.4.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C7F6900-A1E1-4167-84FE-D1E8D70DF33F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5450_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3CC6183C-8FC6-4B27-AEDC-99E59705103E",
"versionEndExcluding": "a21",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DAF60D4-BDA2-43ED-802D-CE3ACB548693",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5480_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1484874-FD72-4A5F-96BE-F185FE7A5B3F",
"versionEndExcluding": "1.14.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5480:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3453B1A-9C28-4007-94FF-FF3C52D65B39",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5488_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "713D6037-E3C7-428B-BB5D-891B6E438A05",
"versionEndExcluding": "1.14.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5488:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3501A531-C8ED-4139-8AEC-48DABD80B006",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5490_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8966A6C-43DE-4F6D-BD66-4D683B95FA50",
"versionEndExcluding": "1.8.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5490:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D53A797-D418-49C3-9FE6-C53C7ACF7982",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5491_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EAAFE96C-3F3F-41F6-B0CD-2D6F775AE0A5",
"versionEndExcluding": "1.7.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5491:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CACFA198-F3B1-4D9A-8A7B-7E678931DABE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5550_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "859B2D72-053C-42FA-9781-25A814988AC3",
"versionEndExcluding": "a21",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FD13310-CCC0-490C-A959-42EF8EC41232",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5580_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "709945EB-1507-4302-985D-06E08D6CADE3",
"versionEndExcluding": "1.14.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB98E18A-D2C1-4522-A814-A1AA2C26F86D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5590_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3ED2CFF9-4DFA-47F7-AA09-5CBFB859440F",
"versionEndExcluding": "1.8.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5590:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC395D9-DA6C-45B5-85E5-7906FE487EBE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_5591_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C04EAB8-1DDF-4253-BE0E-6260BA1AF433",
"versionEndExcluding": "1.7.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_5591:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03543212-F226-48F9-971C-F33D9EE5442E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7202_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "911A412C-253D-4404-9B55-85F1F5493733",
"versionEndExcluding": "a23",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7202:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2ED3121-9C86-4E55-B327-E95C5C6C484A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7212_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D38D2669-53F4-4412-A7BC-60D13006C832",
"versionEndExcluding": "1.25.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7212:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95228F57-F29A-4559-858D-A3701D939CD1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7214_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF58C3EC-5AA3-4038-B452-9765589E64F1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63CB63B5-09C0-4B74-9C9E-95A4910B5F5D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7250_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "709B2DC4-A0CE-4992-B9CF-235FEFBEA10F",
"versionEndExcluding": "a21",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41939083-EF00-4E28-A14F-108A62CDB404",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7275_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA00CC2-7095-4C31-8265-E5A3F61C9C0E",
"versionEndExcluding": "1.5.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7275:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8235A82F-173D-4C3E-B280-D702EA42E2EF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7280_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E5172F0-603E-4118-BEFD-53D3AB126FFF",
"versionEndExcluding": "1.14.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D5D3133-9388-49CF-A85D-2247A4DD9C4C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7285_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99A1C371-D0B8-4C7E-AF28-66562F9707E2",
"versionEndExcluding": "1.3.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7285:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F15F433-B614-402F-90AC-805AFA0FA340",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7290_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20B13785-0EBB-4D49-9F03-63FE173910D7",
"versionEndExcluding": "1.9.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "359A2878-C996-4FD2-9AB6-B33531E2F630",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7350_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14165EDC-7BC7-4E84-B031-C222E176BA63",
"versionEndExcluding": "a18",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B51432C0-5E02-4101-BC43-A0F18A6A2772",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7370_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2486278-3650-4CA3-BB01-4819D2D42D41",
"versionEndExcluding": "1.17.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82234546-AF33-45FC-BF50-2AA8FD38A5A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7380_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E37767D-AC39-447C-930B-885E555CA555",
"versionEndExcluding": "1.14.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1786B67-E621-4B2B-848A-B0F442719E94",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7389_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E672FA99-6FBA-446F-B63D-B5C21ED029F2",
"versionEndExcluding": "1.17.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7389:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0952C9F6-0AB7-4DEA-B6AA-76159A2F7C42",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7390_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D0B7C07-BB7D-4889-9941-0777546F9739",
"versionEndExcluding": "1.9.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D8C3716-4E1C-4D32-BC94-81D7FB838FFC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7390_2-in-1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25F833FA-A1BE-45C6-8BB5-7A3512ECAE03",
"versionEndExcluding": "1.8.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7390_2-in-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C127AF83-FC01-4774-9ADC-7DFA02C8237B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7414_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BED38173-49AB-4B81-B891-6B6AE660BED5",
"versionEndExcluding": "1.23.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7414:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8DFB78B-375B-466F-AA82-6AAC9DAF7DEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7424_rugged_extreme_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47EA0F07-EA2B-4E0F-8389-75F85C446739",
"versionEndExcluding": "1.4.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7424_rugged_extreme:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63EBA970-A46B-48B9-BA12-5169E4BBC426",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7480_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CCE7F61-C34A-4028-9F9D-F0566781F550",
"versionEndExcluding": "1.14.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7480:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA90466D-6AE9-4030-ACFF-033E75A39CBD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_7490_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7618347-33CD-40B9-B81C-10078A197B9A",
"versionEndExcluding": "1.9.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_7490:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26AD9A87-7D62-4566-A1B8-E843176E2E38",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_e5250_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26C11672-E0FE-46E3-A271-F0166F95C8B3",
"versionEndExcluding": "a21",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_e5250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8879A240-30AA-437A-9576-F2FBBD07FABE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_e5270_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A640C92D-3558-45CB-B3A0-0ACEFD54F4D5",
"versionEndExcluding": "1.20.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_e5270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6D4199-F0CF-4D9D-85F9-BA1256B2B3FC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_e5450_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0CA279C-5E45-43E9-98D7-FC26660FEDEB",
"versionEndExcluding": "a21",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_e5450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DC31A8E-C383-4BB1-B142-DCA526B0347D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_e5470_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE988710-E0A1-41FA-BD26-034E2490EDD1",
"versionEndExcluding": "1.20.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_e5470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BA8273A-F00A-42BF-96FA-E2A2180FA134",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_e5550_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44F3E9B2-D1EC-4313-9CB5-0EE880AF77A6",
"versionEndExcluding": "a21",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_e5550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0557A229-F1D2-4A5C-A862-106B2934499C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_e5570_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0A70EDB8-84E4-4235-B15C-9BBE110C4CC6",
"versionEndExcluding": "1.20.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_e5570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F62DF33-04FD-40FE-9ECD-BB6F23673D83",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_e7250_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DE87B419-94E1-4720-ACD3-8D72E250B9FA",
"versionEndExcluding": "a21",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_e7250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E4EF8D1-6886-4DC6-9FAB-D57E4B32D22B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_e7270_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3119F7D7-D354-411F-84EA-DBB73563A0AF",
"versionEndExcluding": "1.21.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_e7270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C322F9F-6E7E-44E5-9E65-6CB71236A485",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_e7450_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5863725A-708F-4ADB-AAB5-5ADE9784EE79",
"versionEndExcluding": "a21",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_e7450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3251782A-482E-4861-A76F-BFA6FE5092CE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:latitude_e7470_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDFEE45C-ADC9-461E-97CB-00A8FBEA8DEE",
"versionEndExcluding": "1.21.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_e7470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA38826D-FEF8-4058-9FA8-6E2E6B504AE7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_3040_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2635BC54-3E63-47E4-80C2-D6D7CB874955",
"versionEndExcluding": "1.10.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_3040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB620A3B-E840-40C5-9109-CAC5C91B7A34",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_3046_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69D6B354-8090-436B-86EF-AD4AFFC195BA",
"versionEndExcluding": "1.7.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_3046:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7780D311-43C0-422A-AAF6-56750E5ED7DA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_3050_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8252FDE-5626-4DF0-B9CF-16EEBA0F7E33",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_3050:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE8D8EDD-C74F-4FA1-ACA0-6983CF786CEA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_3050_aio_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "27EE5E8C-B15D-438E-B748-6B6DBD21E0D0",
"versionEndExcluding": "1.12.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_3050_aio:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1800145-904B-4A9A-BE62-02426AE394DF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_3060_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04E89A78-E105-4C64-BDDD-5D7BAA1DFD7F",
"versionEndExcluding": "1.3.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_3060:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C84B357-B810-4431-B229-ADBF766D988F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_3240_aio_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC0B01BF-DBC1-457B-8DC2-569C596E5FF2",
"versionEndExcluding": "1.7.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_3240_aio:-:*:*:*:*:*:*:*",
"matchCriteriaId": "960DB96F-5518-4632-9FAA-593A037D9A63",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_5040_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "41D8582C-4232-457D-82EE-9677651261B6",
"versionEndExcluding": "1.13.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_5040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86CC4D03-5AC1-437B-96CF-D20CC77A9AB9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_5050_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "920A250B-0569-4A12-B3D9-5CCEBAEE08D7",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_5050:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93A865CE-6BEF-4741-8DD2-A3B555B9D9A4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_5060_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D50A21FF-C6B3-4AE8-9810-60A9952CF907",
"versionEndExcluding": "1.3.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_5060:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EB26A4C-FFB2-425C-B4E6-4E376F979994",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_5250_aio_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03AAA638-3B05-435C-9C5B-74EB5AA53E9E",
"versionEndExcluding": "1.12.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_5250_aio:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6C9BED-EAF3-4D91-8BDF-913E5F3E5C17",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_5260_aio_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "58FB5698-CD2D-4E4D-B601-E3FE50175D8B",
"versionEndExcluding": "1.6.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_5260_aio:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3DFB641-9171-4931-9236-9807677C0E87",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_7040_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7FB74F02-6341-463C-A9E6-B8CBDDAC964D",
"versionEndExcluding": "1.14.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_7040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4DA1CE7-7AD4-4FC9-9130-D1AB179E6BAF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_7050_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F8E85DC-4703-4338-832C-5459CB35A3EE",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_7050:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3F8E0A1-FA9A-4B6B-9877-65B7BEE8D9FD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_7060_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D057BA0-D288-4A4D-84A7-17BBE59BF5AF",
"versionEndExcluding": "1.3.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_7060:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA379B4-8FE9-447D-AE62-6AFD698BE57B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_7440_aio_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B420B44-C8A9-4368-8328-259FE454BE7F",
"versionEndExcluding": "1.10.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_7440_aio:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542A60EE-07E8-43CD-B6DE-B4D55EE461C1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_7450_aio_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB5E621-3EC4-4D0F-B6B6-811536EED0C3",
"versionEndExcluding": "1.12.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_7450_aio:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CFDBFC4-2AEB-4442-8F81-3D5E76126C6E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_7460_aio_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30A718F2-40C3-49C1-91AB-0D59E34CAC92",
"versionEndExcluding": "1.6.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_7460_aio:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA49A6E6-E266-4861-A80C-EB989286653E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_7760_aio_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2211D3D8-67B3-4215-B44C-E8498AE2A4FD",
"versionEndExcluding": "1.6.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_7760_aio:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07DFC7F0-8131-4E02-9376-5678C2ACED54",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:optiplex_xe3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F098AFC-F5B1-420A-8112-B6A470FE2F32",
"versionEndExcluding": "1.3.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:optiplex_xe3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB1ED511-F76B-4329-850E-8A5D7395F8FB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_3420_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B5B39F-A072-4521-A68C-BA37D8FEE422",
"versionEndExcluding": "2.12.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_3420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "652F2878-A44A-4EA7-A8C0-AA19404789F6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_3430_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA52D099-19FC-4B57-B422-269F330EB45A",
"versionEndExcluding": "1.3.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_3430:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B6265CF-E9BF-4E82-BF73-19CB663DD0C7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_3510_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8DF612A5-CC94-499A-B0E5-A1F1A0A81CD1",
"versionEndExcluding": "1.20.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_3510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DB69A94-BA02-4393-B256-68E34AD50110",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_3520_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "90F2E2CB-0FD3-4109-BDB5-AD77ED84F3D6",
"versionEndExcluding": "1.14.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_3520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52677DF4-9C49-45DA-AECA-CDE168A77B27",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_3530_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D1AEE10-1ABB-4D36-93A9-35AAB0DDBE97",
"versionEndExcluding": "1.7.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_3530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED4A7A76-AA0B-4F5C-9797-2DAE0D52A749",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_3620_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB51DB7A-5AA8-4942-A8DD-0B7150A21F3A",
"versionEndExcluding": "2.12.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_3620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4524AF41-5FBB-49B9-BE87-447CE48D81CE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_3630_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98EA14BF-B856-49E9-9708-A7F0D6A28900",
"versionEndExcluding": "1.1.10",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_3630:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA4C5DF-38C6-47DD-8299-FDEA7016ADCB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_3930_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "736AE5DD-E00B-4675-9966-2F7926346ED6",
"versionEndExcluding": "1.1.9",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_3930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC182871-021F-4BD9-83FF-63B3C33D838F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_5510_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "36F34EB8-27AB-41A5-8E54-229ABAAD3AD3",
"versionEndExcluding": "1.10.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_5510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE40F051-53DE-451C-ABFC-2695771A96DF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_5520_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F244E8F8-1B31-49FD-8983-998596260DF7",
"versionEndExcluding": "1.14.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_5520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBBFE522-7630-4BED-9B2C-2AC12CA693DE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_5530_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "97B39FB0-B856-465C-A00F-15EA2C4ACF24",
"versionEndExcluding": "1.10.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_5530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F71189EF-0E04-4A17-8B22-B51C533F8D4E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_5530_2-in-1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3C3266F-9D60-4D5B-ADA6-CFE7F717CFA3",
"versionEndExcluding": "1.4.8",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_5530_2-in-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30622F6E-2F6D-482B-AA1E-65DA4A4B1679",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_5720_aio_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E61F7686-5030-4A00-A3C4-90DAEA06B1A8",
"versionEndExcluding": "2.4.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_5720_aio:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2B639A5-8322-4065-850E-F5DA959E453B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_5820_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "58DCDCAB-A0BA-4E84-AC52-1F4DC1708437",
"versionEndExcluding": "1.10.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_5820:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E12F96DC-54C7-4891-8723-D1B240165CBC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_7510_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B240BA07-777D-4FD5-9642-E7642047EFB0",
"versionEndExcluding": "1.17.7",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_7510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "659D0E86-F188-4A23-BBFD-A12B71EA5F73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_7520_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BA0FCDBE-8886-4387-942A-FC9202D56837",
"versionEndExcluding": "1.14.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_7520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73DD5C64-A10A-42F9-8F31-EF27A85E2A89",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_7530_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4EE3DD9-0912-47B6-8B58-99C41B0A1434",
"versionEndExcluding": "1.8.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_7530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC7B2C87-ABAE-4935-B160-843B35556055",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_7710_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0C4E2DF-7C9E-4B18-B8CF-C10F5412DEFB",
"versionEndExcluding": "1.17.7",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_7710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "551C8B0E-06F8-4ECD-A4FB-8756D579B377",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_7720_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44D44998-CE34-4549-A61F-8E9493B00078",
"versionEndExcluding": "1.14.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_7720:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41B4E127-666D-4F61-9F5B-F8D3E8645054",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_7820_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7E10C34E-DFA8-4A92-B882-69A35E26B8BB",
"versionEndExcluding": "1.10.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_7820:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA0FD696-4C1F-416C-95EB-36FEA77BEB6F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_7920_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B8F6255-E568-431E-AB76-F36F191ADC07",
"versionEndExcluding": "1.10.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_7920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BCCF11B-05BD-4E70-AD26-6B26A7E701FA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_t5810_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "548C221F-C6C2-4ED6-AB71-93D76AB91512",
"versionEndExcluding": "a30",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_t5810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C071F560-C13C-4D36-A7A1-63C9A919712D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_t7810_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FACA0B19-1061-4B8E-BC89-DA840734C04E",
"versionEndExcluding": "a30",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_t7810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D30A1AE0-49D9-4285-B013-7E863B25D052",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:precision_t7910_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D620C36-E0A4-424A-8E45-B54AE785F5A4",
"versionEndExcluding": "a30",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:precision_t7910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84B43CA8-0F28-498B-8471-26A610C39958",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:venue_7140_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED284AB1-9117-49F5-9026-23BC522B76D9",
"versionEndExcluding": "a18",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:venue_7140:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1498AD5-EBF1-45E9-BEBE-4BF657CFA4AE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3468_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B164D0E-11C2-48EB-A6ED-CD4F57480538",
"versionEndExcluding": "3.3.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3468:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DC032C0-BF0C-427A-AF06-BF80F800E08D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_5468_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DE066C3-49DE-413C-92E1-354E7B70E848",
"versionEndExcluding": "1.10.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_5468:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E191589-3B94-4461-86FE-F953B1E1409C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3568_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54D85748-3486-42B3-8180-47B202BC5162",
"versionEndExcluding": "3.3.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3568:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C62F3ED8-276D-43B8-8D9D-AF3FB10513E0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_5568_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E7AB9B6-1389-447A-BC2E-1675A4AB6264",
"versionEndExcluding": "1.10.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_5568:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21A8BABC-DD82-4F43-8CE4-88C0D9FB068B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_7570_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2806B994-6D5B-44C4-A61D-6FDB46AD1DC4",
"versionEndExcluding": "1.7.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_7570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26CA0667-E643-4EC3-95F1-115FE764DB6A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_7580_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "334C40B6-E919-4D97-958B-04030BB9D90D",
"versionEndExcluding": "1.10.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_7580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D957902A-82A3-4237-B933-2E64F22DAE2E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3070_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4552AAC8-FDAB-4F50-A07C-BE8940C6388B",
"versionEndExcluding": "1.5.21",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3070:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9F7A326-0F81-4E47-970E-E286FC1AF55C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3267_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3641F86-04B6-4F88-9676-330E13FC2A9E",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3267:-:*:*:*:*:*:*:*",
"matchCriteriaId": "055E575D-79A3-4052-8A59-CBE183998389",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3268_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C960E49-921C-4588-94F4-CDCD427839B1",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3268:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76431D60-6BFC-4B08-AB1B-9B8EF2F9D68B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3458_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83D1CEC2-4DD8-47EE-90DA-1D02589A8758",
"versionEndExcluding": "a15",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3458:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3281CAC-E12F-4515-9BD2-9A52C978A773",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3459_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01144FA4-5B93-48BA-B945-9BC5F27FC995",
"versionEndExcluding": "1.6.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3459:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A17A167-477E-4394-B1CB-ADBDFBAD5E2A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3470_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C3C681F-6198-4E44-9EA3-D2DF8654F702",
"versionEndExcluding": "1.5.21",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BB108A7-399E-4AF6-9A33-1213F871A2F8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3478_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7EC122F3-7E39-48E2-86D2-BF7675DE2D57",
"versionEndExcluding": "1.7.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3478:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8B770FD-BA95-41B7-8631-B949E14334D8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3480_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35744961-951C-4A56-8169-0C21AF838064",
"versionEndExcluding": "1.4.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3480:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB4F9B4-B4B2-4247-9E5D-0FB872C79CE9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3580_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E70B4F5C-89B0-4F7D-B0AA-6220B93F992B",
"versionEndExcluding": "1.4.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "860A978D-7914-4E0A-9CF9-55B68E5630F6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3581_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "02797496-BBED-48A4-A030-06740B64974D",
"versionEndExcluding": "1.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3581:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02AAC7DD-0091-4272-90DE-D02E9AF0AFAB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3584_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC6FC934-C8FC-40F9-96F1-C58FDE57DF77",
"versionEndExcluding": "1.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3584:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DED6DD1-EAF5-43CA-8F29-80EF4B4DF18C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3583_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C79462-5016-4009-803B-F7A7737CD794",
"versionEndExcluding": "1.4.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3583:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACA4553E-BFC0-4DCC-825C-93CA7E690DB7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3660_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F006622C-D778-4D95-8883-E065ECA70BC4",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3660:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0248B861-9A85-4163-ABCF-EE986203A951",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3667_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52BA22E1-D0FD-42C2-A14A-14CCA646FE5C",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3667:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE6B6BF7-C554-4688-B7E4-835A7E2011F5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3668_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92EF9EA5-B0CF-4668-B344-03A7D1592F9B",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3668:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05B16623-5270-4F14-A284-CF1B37FD422A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3669_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F306FAB-0490-4EBA-A77C-2908024FE20D",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3669:-:*:*:*:*:*:*:*",
"matchCriteriaId": "059A976C-0D2B-46C9-9009-10574F9C09F1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_3670_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9090B54D-54D5-4638-BA4C-18377FE81CBF",
"versionEndExcluding": "1.5.21",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_3670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "275EF2AF-EAD2-4A9D-AA73-C1BB271A6191",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_5370_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05624B9F-2A9A-4A5C-8E70-C84FDF69AF80",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_5370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5F7E50C-560E-40CC-BC62-FED4CA0638A7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_5471_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71EEFAC1-0F6F-4797-BB9C-BC15C488EA06",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_5471:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8F9161B-C8AF-48D8-BD26-E2E880BA384B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_5481_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42F5FEDF-B081-4D10-BCE2-685BEA869CF2",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_5481:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B90DAA0-3F83-46CB-8D58-541E30761E89",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:vostro_5581_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2764B34-855F-4A1D-B2E3-CF121F28B325",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:vostro_5581:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DA8B6A9-030B-4684-A92F-E69F781881D8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:wyse_5070_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E006F2B8-88CB-4619-A723-94296067258D",
"versionEndExcluding": "1.1.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:wyse_5070:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F53D34DB-897A-430E-B05A-856EF03EC63E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:wyse_7040_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99F828D2-138D-4B9A-8A3B-9B0BC54C7AFA",
"versionEndExcluding": "1.5.9",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:wyse_7040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72818FAB-AE59-4639-A7B8-1217C6BD9809",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:xps_9250_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D6777B31-77B7-4AB3-B7C2-E3AAAE4FE5E4",
"versionEndExcluding": "1.5.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:xps_9250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC3C5A09-7D48-41C5-9025-C0A635004C01",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:xps_9350_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "316224CE-E946-443F-B929-F9F605A8A618",
"versionEndExcluding": "1.10.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:xps_9350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "019583AE-F1FD-4BC1-B844-E37567A954DE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:xps_9360_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DEC4612E-6F11-4521-9F38-BC7B8C717F1F",
"versionEndExcluding": "2.11.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:xps_9360:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C93571A8-77EB-4E5E-9B1E-FC37E573FBF9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:xps_9370_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88D8679F-8F93-4D8F-B811-4447636933E5",
"versionEndExcluding": "1.9.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:xps_9370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C956ECE1-041D-4630-B632-C49DAC566F18",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:xps_9380_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "969D29FC-2722-4B74-B028-983F98AEABE8",
"versionEndExcluding": "1.3.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:xps_9380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B477060-7AEC-4F7D-8000-3590D5363E76",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:xps_9550_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52BD9F5C-0A9A-42EE-990C-031D58CC8E7E",
"versionEndExcluding": "1.10.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:xps_9550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3A23D13-1EFB-432F-B06B-571BD93929B1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:xps_9560_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE837116-09E0-4E7E-B33F-0B30A5DE8248",
"versionEndExcluding": "1.14.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:xps_9560:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2740318-F35E-4F79-8D19-9EBD88E90DC6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:xps_9570_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "584AD7B2-9F41-4377-9FB3-BF4249E437F3",
"versionEndExcluding": "1.9.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:xps_9570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "311CEA3A-1EC4-44C4-9570-FC196F649F5F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:xps_7760_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28F4A048-FE45-49EE-91DC-5DE41EB66B99",
"versionEndExcluding": "2.4.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:xps_7760:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4077CC2E-71A8-47C4-82B5-AD68F2EFD703",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:xps_8900_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE940FAB-ED17-4009-8084-7A5BE6516BB9",
"versionEndExcluding": "2.5.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:xps_8900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B09872A5-50B3-4E8A-A623-48DC381F344B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:xps_9575_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1B1E0D2C-65AC-4BDD-BBAD-439A94308D5E",
"versionEndExcluding": "1.4.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:xps_9575:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27136844-0541-4D2F-9C4A-15316F307385",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:xps_9343_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E72AC44-9F81-4B59-96F6-1C72A427B587",
"versionEndExcluding": "a19",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:xps_9343:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF91435F-9901-4D0B-9794-21E680523709",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | 10,352 |
CVE-2019-3800 | 2019-08-05T17:15:10.960 | CF CLI version prior to v6.45.0 (bosh release version 1.16.0) writes the client id and secret to its config file when the user authenticates with --client-credentials flag. A local authenticated malicious user with access to the CF CLI config file can act as that client, who is the owner of the leaked credentials. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"exploitabilityScore": 2,
"impactScore": 3.7,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://pivotal.io/security/cve-2019-3800"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.cloudfoundry.org/blog/cve-2019-3800"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pivotal:cloud_foundry_command_line_interface:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4FD32DF-0EF0-4CDA-992A-FFD404A05AB2",
"versionEndExcluding": "6.45.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:cloud_foundry_command_line_interface_release:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04F8E5C0-449F-4E58-9113-A95D0A5E4F86",
"versionEndExcluding": "1.16.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:cloud_foundry_deployment:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13D840EB-A220-4C25-8B72-3506ADB08A7E",
"versionEndExcluding": "10.0.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:cloud_foundry_deployment_concourse_tasks:*:*:*:*:*:*:*:*",
"matchCriteriaId": "90B6B206-94FC-4C78-9934-671FD9F48899",
"versionEndExcluding": "9.3.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:cloud_foundry_log_cache_release:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC091EB-B582-4AA6-8C03-AC22248446EB",
"versionEndExcluding": "2.3.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:cloud_foundry_networking_release:*:*:*:*:*:*:*:*",
"matchCriteriaId": "652F9F32-36BA-4746-B1E4-8349E90EFD13",
"versionEndExcluding": "2.23.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:cloud_foundry_notifications:*:*:*:*:*:*:*:*",
"matchCriteriaId": "949C15FF-9BBC-4505-AE49-D6846A2B6EEB",
"versionEndExcluding": "58",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:cloud_foundry_routing_release:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BD6293D-319B-4F5B-A53E-45327F874782",
"versionEndExcluding": "0.189.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:cloud_foundry_smoke_test:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B0CC085B-863D-49F7-BDC6-000E0DFCF28B",
"versionEndExcluding": "40.0.113",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pivotal:application_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCA35BC9-394D-4ABB-9DA5-C167945D1A13",
"versionEndExcluding": "2.3.14",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:application_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B921F25-9042-4FBD-B739-1EA2FE65DC94",
"versionEndExcluding": "2.4.10",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:application_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30EDADC2-4D9D-4271-BEAF-7CF3A3C0DB74",
"versionEndExcluding": "2.5.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:cloud_foundry_autoscaling_release:*:*:*:*:*:*:*:*",
"matchCriteriaId": "91C32CE6-5C18-40E9-9608-D15BB4E24788",
"versionEndExcluding": "219",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:cloud_foundry_event_alerts:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA2B204A-4EA4-44A3-B27B-3336D1A9FBFB",
"versionEndExcluding": "1.2.8",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:cloud_foundry_healthwatch:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71BC43B2-F5C3-4AFD-990F-19D364F7781E",
"versionEndExcluding": "1.4.7",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:cloud_foundry_healthwatch:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED64D8C0-E124-459B-A377-71CEFF182DFD",
"versionEndExcluding": "1.5.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:credhub_service_broker_for_pcf:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB1AAA37-B13F-4DBE-B2C0-3A0410C9DD3A",
"versionEndExcluding": "1.3.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:metric_registrar_release:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B072EBB3-FED0-4468-A9E8-5B6E2B329D3A",
"versionEndExcluding": "1.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:on_demand_service_broker:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA8C62A2-4B4C-40D8-8E64-6B5BC06D93BD",
"versionEndExcluding": "0.29.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:pivotal_cloud_foundry_service_broker:*:*:*:*:*:aws:*:*",
"matchCriteriaId": "6BCC700B-731F-42F6-9675-59C3AFC4DF33",
"versionEndExcluding": "1.4.13",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:single_sign-on:*:*:*:*:*:cloud_foundry:*:*",
"matchCriteriaId": "94632FE3-6B3C-43A6-9DC7-166A7CC909F5",
"versionEndExcluding": "1.7.5",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:single_sign-on:*:*:*:*:*:cloud_foundry:*:*",
"matchCriteriaId": "7862820E-B6FD-4820-BB47-2983D7465BC4",
"versionEndExcluding": "1.8.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pivotal:single_sign-on:*:*:*:*:*:cloud_foundry:*:*",
"matchCriteriaId": "CF89202E-09F7-4311-A667-3CBD066156D4",
"versionEndExcluding": "1.9.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.9.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:anynines:elasticsearch:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "8CDB4E4C-A0C8-4335-8EE3-1A15876CB32D",
"versionEndExcluding": "2.1.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:anynines:logme:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "E23C5203-CEBC-4E0A-AC84-2AC8E1568F71",
"versionEndExcluding": "2.1.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:anynines:mongodb:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "2AB2AFD4-8989-4A6E-9D4B-631D53CFE0D6",
"versionEndExcluding": "2.1.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:anynines:mysql:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "9CCC2276-21BD-46EF-8AFD-42E5067448F0",
"versionEndExcluding": "2.1.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:anynines:postgresql:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "A304D180-9C7F-4748-B891-56B4913ED853",
"versionEndExcluding": "2.1.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:anynines:rabbitmq:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "1CA8DFF1-40F0-4311-BA6E-ACEB67F58622",
"versionEndExcluding": "2.1.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:anynines:redis:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "E002C51E-F5ED-4232-B756-995ABEED1DC2",
"versionEndExcluding": "2.1.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apigee:edge_service_broker:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "0438F2AA-B66E-4AE8-AACC-8D7FF57F18D7",
"versionEndExcluding": "3.1.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:appdynamics:application_analytics:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "D53361F1-DE54-4808-B1B5-56149BABD9DA",
"versionEndExcluding": "4.7.652",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:appdynamics:application_performance_monitoring:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "44473CD4-1DF6-48EF-B317-12BD36BFF420",
"versionEndExcluding": "4.6.64",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:appdynamics:platform_montioring:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "4DD01FBD-0F69-4793-8343-E5B735171C9B",
"versionEndExcluding": "4.7.712",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bluemedora:nozzle:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "ACA4480D-2A59-4DA8-A144-7EB97A570BFF",
"versionEndExcluding": "3.1.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:contrastsecurity:service_broker:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "AEC4F727-7085-4C7C-A0A8-EC77E0C6E89F",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cyberark:conjur_service_broker:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "CF0261DA-818C-46D5-93F6-AB77154C47F1",
"versionEndExcluding": "1.1.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:datadoghq:application_monitoring:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "32C06495-7CB3-4FF5-AA1F-5F2882FD5206",
"versionEndExcluding": "1.7.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:datastax:enterprise_service_broker:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "AEF84CBA-E099-41AD-8B3C-D3603C409810",
"versionEndExcluding": "1.0.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dynatrace:service_broker:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "16849497-DD68-4C1B-BFCB-91904F2F36B5",
"versionEndExcluding": "1.4.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:forgerock:service_broker:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "E996866D-CEE3-4C0C-9011-A62BC94C4ECF",
"versionEndExcluding": "2.1.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:google_cloud_platform_service_broker:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "C1F611B8-B347-4AEF-9479-80C8AC8457E1",
"versionEndExcluding": "4.2.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_liberty_:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "F9339579-1F54-4065-B5A8-C51EA9D5CF6E",
"versionEndExcluding": "3.11.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_log_analytics_nozzle:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "4F38E12C-5675-4290-BE46-11F2768AABF1",
"versionEndExcluding": "1.4.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_service_broker:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "BE11B12D-E020-4411-A85E-589F813894E7",
"versionEndExcluding": "1.4.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:newrelic:dotnet_extension_buildpack:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "F861138B-93A0-4E61-9205-B1505AD02C1D",
"versionEndExcluding": "1.1.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:newrelic:nozzle:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "5EE16E5F-6078-4293-B0F1-020D6AF79105",
"versionEndExcluding": "1.1.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:newrelic:service_broker:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "436B6156-3CFA-42E8-8B8D-A142B43E1680",
"versionEndExcluding": "1.12.64",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pagerduty:service_broker:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "9D1ACC13-1833-44B9-9629-6E149A61395A",
"versionEndExcluding": "1.2.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:riverbed:steelcentral_appinternals:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "CCE2DA38-E945-41EE-A11E-C0B23BCFB89C",
"versionEndExcluding": "10.21.1-bl516",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:samba:volume_service:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "BEF05596-F907-4DF6-BB67-69A6171C53A0",
"versionEndExcluding": "1.1.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:signalsciences:service_broker:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "6F399A62-9A6F-442B-AB45-7C0BE9F5B5AF",
"versionEndExcluding": "1.1.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:snyk:service_broker:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "40D76AE1-283E-457F-B7B4-3DB57A1ED4F8",
"versionEndExcluding": "1.0.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:solace:pubsub\\+:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "74F25242-39A9-4FB0-9929-07D27C67606A",
"versionEndExcluding": "2.3.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:splunk:nozzle:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "77591548-6E7E-414F-B4BE-14399AE18CE4",
"versionEndExcluding": "1.1.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sumologic:nozzle:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "AA182A4D-BB7B-4EC1-B764-B74BC56D4D7E",
"versionEndExcluding": "1.0.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:synopsys:seeker_iast_service_broker:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "65756938-5D6D-431A-93BD-107604C196EB",
"versionEndExcluding": "1.2.14",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tibco:businessworks_buildpack:*:*:*:*:container:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "1807AAE6-8F92-4A21-8836-D3C61DC58B54",
"versionEndExcluding": "2.4.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wavefront:wavefront_by_vmware_nozzle:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "66C6C1F0-17EC-47CD-BF12-30F5F6B60BF3",
"versionEndExcluding": "1.0.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:yugabyte:db_enterprise:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"matchCriteriaId": "78C34123-DE82-42BB-BD94-A8311E32A040",
"versionEndExcluding": "1.1.8",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,353 |
CVE-2019-11198 | 2019-08-05T18:15:10.657 | Multiple cross-site scripting (XSS) vulnerabilities in Sitecore CMS 9.0.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) #300583 - List Manager Dashboard module, (2) #307638 - Campaign Creator module, (3) #316994 - Attributes field, (4) I#316995 - Icon Selection module, (5) #317000 - Latitude field, (6) #317000 - Longitude field, (7) #317017 - UploadPackage2.aspx module, (8) #317072 - Context menu, or (9) I#317073 - Insert from Template dialog. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/92/Sitecore%20Experience%20Platform%2092%20Initial%20Release/Release%20Notes"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://outpost24.com/blog"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sitecore:cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B48F96-1422-4E56-A2D6-8356D53E3D33",
"versionEndExcluding": null,
"versionEndIncluding": "9.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,354 |
CVE-2019-12264 | 2019-08-05T18:15:10.863 | Wind River VxWorks 6.6, 6.7, 6.8, 6.9.3, 6.9.4, and Vx7 has Incorrect Access Control in IPv4 assignment by the ipdhcpc DHCP client component. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K41190253"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03960en_us"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12264"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:windriver:vxworks:6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3219535A-64F3-4106-8652-7DD72808AC3D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:windriver:vxworks:6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D930A712-C6C8-4251-8FB5-78E65DF2DFBD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:windriver:vxworks:6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3F36DA7F-6593-4327-A104-2F8829F2ED32",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:windriver:vxworks:6.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1726AC51-261E-4347-A666-E92C55B8826C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:windriver:vxworks:6.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E0D9EFB4-ADBA-4353-BB26-2330832F69BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:windriver:vxworks:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4810B35-06F6-4971-BE87-A30B1CF58AA0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3950CA89-B400-427C-B6F2-54337AB694E0",
"versionEndExcluding": null,
"versionEndIncluding": "07.0.07",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:hirschmann_ees20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D35A90AD-034E-434A-B989-4F871E0AD9A5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_ees25:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3EF7BBA-2BCC-4A16-BBEE-E67CE8F95BE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_eesx20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76F453AF-21B0-4611-95D7-88AD821632E8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_eesx30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE6A655D-ED55-4344-9F75-5995371C87C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_grs1020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29576107-85D0-4877-875F-7F60EFDB803D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_grs1030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6200A3-7B4F-4A8E-B9DC-EE6A82093C20",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_grs1042:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEBA19D8-8B2D-4AD0-AA77-A3139C33F44D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_grs1120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4F7FEA-BB1F-405E-A047-87D0BF0DF054",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_grs1130:-:*:*:*:*:*:*:*",
"matchCriteriaId": "641912E2-C368-4438-8D5C-F6615B9FDABC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_grs1142:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F86BB5E8-4499-4E4F-AE5E-1471B297C16F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_msp30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E89FAE18-5B44-4203-ABFD-BC40AF7E51BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_msp32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D0DFE2E-2356-46D6-B2D9-89FD907CA168",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rail_switch_power_lite:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE06D94-B686-4468-86CF-AA68BB5CFEF4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rail_switch_power_smart:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC6487F7-284A-40C2-B70D-9380AD2A47C1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_red25:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79354FA2-4C48-4506-94BE-7B9ECB18015D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsp20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DED918F8-041E-4FFC-AFE8-484828696EDB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsp25:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4ED7974C-BBE6-4BAE-8962-7B5638C7AE20",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsp30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE16D46-7BA9-43D4-BB4E-1B638CE6C41B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rsp35:-:*:*:*:*:*:*:*",
"matchCriteriaId": "165B837A-EF09-489F-BD7C-54107F491BC8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rspe30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C06BF302-8E62-41DB-AA67-6369527B598F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rspe32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56D29DAB-C5D6-4539-86E4-43624FB957A9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rspe35:-:*:*:*:*:*:*:*",
"matchCriteriaId": "305A9B3E-786C-4F8E-BE36-B4ED84650288",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_rspe37:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CBC8B88-4EC3-4827-B100-3A5A91B29CC2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2681FAC3-1E59-497A-9931-F4059F84EF86",
"versionEndExcluding": null,
"versionEndIncluding": "07.5.01",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:hirschmann_msp40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E92390DF-BFCC-4F30-88A0-33F63CA9B1B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_octopus_os3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A18D078E-1F1A-4DE5-AE43-840D96BE1C6C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98C84F5B-72F6-4059-B634-80EE072D0DF9",
"versionEndExcluding": null,
"versionEndIncluding": "07.2.04",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:hirschmann_dragon_mach4000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E0562EC-4942-4D14-A634-8A6A5FDB9561",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_dragon_mach4500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79E8B334-8109-4664-8DCC-10876BD702DC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB09BFE-D6C9-4433-A53A-F79608BFACA9",
"versionEndExcluding": null,
"versionEndIncluding": "05.3.06",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:hirschmann_eagle_one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D6D7B3E-90AD-43D9-9192-453A37921E8F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_eagle20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "771189D9-34F0-400D-938B-2AA218C28C43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:belden:hirschmann_eagle30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DCF228A-F3A8-4B36-A105-04E88980BA76",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:belden:garrettcom_magnum_dx940e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE3BDD99-1DFA-4037-8E77-902F39842153",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1_y7",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belden:garrettcom_magnum_dx940e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B635F0-96C1-49DA-957C-2ECD55A316C0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:ruggedcom_win7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47C998D1-9DD5-4470-9241-174170541408",
"versionEndExcluding": "bs5.2.461.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:ruggedcom_win7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD6F6C12-9373-48F2-B576-C9AC7A287B53",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:ruggedcom_win7018_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8216AFC1-213B-4E31-8660-5161E08A7C4E",
"versionEndExcluding": "bs5.2.461.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:ruggedcom_win7018:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0F5DBF-4730-40CE-B9CE-DD4DA31D3ED6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:ruggedcom_win7025_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE5D7B8D-E74F-4839-8839-23894307992D",
"versionEndExcluding": "bs5.2.461.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:ruggedcom_win7025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63967CFD-D35C-4793-858A-032C44E282F9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:ruggedcom_win7200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD25C864-C272-45B7-8EC5-9120DF6A2072",
"versionEndExcluding": "bs5.2.461.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:ruggedcom_win7200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7146409-09B7-499C-9544-361B234E952D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | 10,355 |
CVE-2019-10980 | 2019-08-05T19:15:11.117 | A type confusion vulnerability may be exploited when LAquis SCADA 4.3.1.71 processes a specially crafted project file. This may allow an attacker to execute remote code. The attacker must have local access to the system. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-213-06"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:laquisscada:scada:4.3.1.71:*:*:*:*:*:*:*",
"matchCriteriaId": "00921E1E-7AD9-4AE5-8689-AD04A22FDA7C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,357 |
CVE-2019-10994 | 2019-08-05T19:15:11.193 | Processing a specially crafted project file in LAquis SCADA 4.3.1.71 may trigger an out-of-bounds read, which may allow an attacker to obtain sensitive information. The attacker must have local access to the system. A CVSS v3 base score of 2.5 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-213-06"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:laquisscada:scada:4.3.1.71:*:*:*:*:*:*:*",
"matchCriteriaId": "00921E1E-7AD9-4AE5-8689-AD04A22FDA7C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,358 |
CVE-2019-14546 | 2019-08-05T19:15:11.257 | An issue was discovered in EspoCRM before 5.6.9. Stored XSS was executed on the Preference page as well as while sending an email when a malicious payload was inserted inside the Email Signature in the Preference page. The attacker could insert malicious JavaScript inside his email signature, which fires when the victim replies or forwards the mail, thus helping him steal victims' cookies (hence compromising their accounts). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gauravnarwani.com/publications/CVE-2019-14546/"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/espocrm/espocrm/commit/ffd3f762ce4a8de3b8962f33513e073c55d943b5"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/espocrm/espocrm/issues/1369"
},
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/espocrm/espocrm/releases/tag/5.6.9"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:espocrm:espocrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8863F2C2-81D8-4EC9-9EB7-05652984FDE1",
"versionEndExcluding": "5.6.9",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,359 |
CVE-2019-14547 | 2019-08-05T19:15:11.333 | An issue was discovered in EspoCRM before 5.6.9. Stored XSS was executed when a attacker sends an attachment to admin with malicious JavaScript in the filename. This JavaScript executed when an admin selects the particular file from the list of all attachments. The attacker could inject the JavaScript inside the filename and send it to users, thus helping him steal victims' cookies (hence compromising their accounts). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gauravnarwani.com/publications/cve-2019-14547/"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/espocrm/espocrm/commit/ffd3f762ce4a8de3b8962f33513e073c55d943b5"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/espocrm/espocrm/issues/1369"
},
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/espocrm/espocrm/releases/tag/5.6.9"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:espocrm:espocrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8863F2C2-81D8-4EC9-9EB7-05652984FDE1",
"versionEndExcluding": "5.6.9",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,360 |
CVE-2019-14548 | 2019-08-05T19:15:11.443 | An issue was discovered in EspoCRM before 5.6.9. Stored XSS in the body of an Article was executed when a victim opens articles received through mail. This Article can be formed by an attacker using the Knowledge Base feature in the tab list. The attacker could inject malicious JavaScript inside the body of the article, thus helping him steal victims' cookies (hence compromising their accounts). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gauravnarwani.com/publications/cve-2019-14548/"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/espocrm/espocrm/commit/ffd3f762ce4a8de3b8962f33513e073c55d943b5"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/espocrm/espocrm/issues/1369"
},
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/espocrm/espocrm/releases/tag/5.6.9"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:espocrm:espocrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8863F2C2-81D8-4EC9-9EB7-05652984FDE1",
"versionEndExcluding": "5.6.9",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,361 |
CVE-2019-14549 | 2019-08-05T19:15:11.507 | An issue was discovered in EspoCRM before 5.6.9. Stored XSS was executed inside the title and breadcrumb of a newly formed entity available to all the users. A malicious user can inject JavaScript in these values of an entity, thus stealing user cookies when someone visits the publicly accessible link. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gauravnarwani.com/publications/cve-2019-14549/"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/espocrm/espocrm/commit/ffd3f762ce4a8de3b8962f33513e073c55d943b5"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/espocrm/espocrm/issues/1369"
},
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/espocrm/espocrm/releases/tag/5.6.9"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:espocrm:espocrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8863F2C2-81D8-4EC9-9EB7-05652984FDE1",
"versionEndExcluding": "5.6.9",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,362 |
CVE-2019-14550 | 2019-08-05T19:15:11.600 | An issue was discovered in EspoCRM before 5.6.9. Stored XSS was executed when a victim clicks on the Edit Dashboard feature present on the Homepage. An attacker can load malicious JavaScript inside the add tab list feature, which would fire when a user clicks on the Edit Dashboard button, thus helping him steal victims' cookies (hence compromising their accounts). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gauravnarwani.com/publications/cve-2019-14550/"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/espocrm/espocrm/commit/ffd3f762ce4a8de3b8962f33513e073c55d943b5"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/espocrm/espocrm/issues/1369"
},
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/espocrm/espocrm/releases/tag/5.6.9"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:espocrm:espocrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8863F2C2-81D8-4EC9-9EB7-05652984FDE1",
"versionEndExcluding": "5.6.9",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,363 |
CVE-2019-14665 | 2019-08-05T19:15:11.693 | Brandy 1.20.1 has a heap-based buffer overflow in define_array in variables.c via crafted BASIC source code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://sourceforge.net/p/brandy/bugs/8/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:brandy_project:brandy:1.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7089AF31-C710-4BE9-B637-A37853704588",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,364 |
CVE-2019-5502 | 2019-08-05T19:15:11.803 | SMB in Data ONTAP operating in 7-Mode versions prior to 8.2.5P3 has weak cryptography which when exploited could lead to information disclosure or addition or modification of data. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20190802-0002/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:data_ontap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "661AA703-BAFA-4711-B224-CABEFE323BC9",
"versionEndExcluding": "8.2.5",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:netapp:data_ontap:8.2.5:p1:*:*:*:*:*:*",
"matchCriteriaId": "9A5B2ACC-885C-487F-95F6-B67983E9E255",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:netapp:data_ontap:8.2.5:p2:*:*:*:*:*:*",
"matchCriteriaId": "CC3377B6-1732-4A2B-98BC-21AA79812363",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,365 |
CVE-2019-14475 | 2019-08-05T20:15:11.030 | eQ-3 Homematic CCU2 2.47.15 and prior and CCU3 3.47.15 and prior use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID from CVE-2019-9583, resulting in the ability to read the service messages, clear the system protocol, create a new user in the system, or modify/delete internal programs. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://psytester.github.io/CVE-2019-14475"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:eq-3:ccu2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CBFCAA60-2021-4DAE-B9DA-A4C45ACD286D",
"versionEndExcluding": null,
"versionEndIncluding": "2.47.15",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:eq-3:ccu2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "125CA411-3433-4848-8EBC-E94808C862FB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9ECA4670-4D98-43C1-A1F4-6F77B14423E4",
"versionEndExcluding": null,
"versionEndIncluding": "3.47.15",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:eq-3:ccu3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DAEB3E1D-3D34-4B6D-AC9F-F0F28370050A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | 10,366 |
CVE-2019-14664 | 2019-08-05T20:15:11.250 | In Enigmail below 2.1, an attacker in possession of PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, he unknowingly leaks the plaintext of the encrypted message part(s) back to the attacker. This attack variant bypasses protection mechanisms implemented after the "EFAIL" attacks. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVNTEF3WSOOQYKMIPEH7F77UPXES5BU5/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CYWBJHSBBLAHKMRWDWH2XXQDYAGDHB5I/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GHC5WDQ47FQSL5CTGQUYIHVC3RNZ7UH5/"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://sourceforge.net/p/enigmail/bugs/984/"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.enigmail.net/index.php/en/download/changelog"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F8173C8A-59C0-4F74-826B-AA18C869D3BA",
"versionEndExcluding": "2.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,367 |
CVE-2019-14667 | 2019-08-05T20:15:11.890 | Firefly III 4.7.17.4 is vulnerable to multiple stored XSS issues due to the lack of filtration of user-supplied data in the transaction description field and the asset account name. The JavaScript code is executed during a convert transaction action. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/firefly-iii/firefly-iii/commit/15d4d185bbedf2bb9db4a8fa2ccf9fc359a06194"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/firefly-iii/firefly-iii/commit/427de0594d05a8222f55b2894311e648ba1be991"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/firefly-iii/firefly-iii/issues/2363"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:firefly-iii:firefly_iii:4.7.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7DE5F84A-E975-4C01-8B27-FFCE39F24EA9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,368 |
CVE-2019-14668 | 2019-08-05T20:15:11.967 | Firefly III 4.7.17.3 is vulnerable to stored XSS due to the lack of filtration of user-supplied data in the transaction description field. The JavaScript code is executed during deletion of a transaction link. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/firefly-iii/firefly-iii/commit/3ad4e04e2ae50e60564b60b68dfac083e5684882"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/firefly-iii/firefly-iii/issues/2364"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:firefly-iii:firefly_iii:4.7.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "07608727-1384-457D-A9E9-76A9DE166635",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,369 |
CVE-2019-14669 | 2019-08-05T20:15:12.047 | Firefly III 4.7.17.3 is vulnerable to stored XSS due to the lack of filtration of user-supplied data in the asset account name. The JavaScript code is executed during a visit to the audit account statistics page. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/firefly-iii/firefly-iii/commit/2ddf48f15cbdbb475221c299872420f625c3bc3f"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/firefly-iii/firefly-iii/issues/2366"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:firefly-iii:firefly_iii:4.7.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "07608727-1384-457D-A9E9-76A9DE166635",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,370 |
CVE-2019-14670 | 2019-08-05T20:15:12.127 | Firefly III 4.7.17.3 is vulnerable to stored XSS due to the lack of filtration of user-supplied data in the bill name field. The JavaScript code is executed during rule-from-bill creation. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/firefly-iii/firefly-iii/commit/692b256f3f6d9eab992a72eb042844220b314054"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/firefly-iii/firefly-iii/issues/2365"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:firefly-iii:firefly_iii:4.7.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "07608727-1384-457D-A9E9-76A9DE166635",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,371 |
CVE-2019-14671 | 2019-08-05T20:15:12.203 | Firefly III 4.7.17.3 is vulnerable to local file enumeration. An attacker can enumerate local files due to the lack of protocol scheme sanitization, such as for file:/// URLs. This is related to fints_url to import/job/configuration, and import/create/fints. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/firefly-iii/firefly-iii/commit/e80d616ef4397e6e764f6b7b7a5b30121244933c"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/firefly-iii/firefly-iii/issues/2367"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:firefly-iii:firefly_iii:4.7.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "07608727-1384-457D-A9E9-76A9DE166635",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,372 |
CVE-2019-14672 | 2019-08-05T20:15:12.297 | Firefly III 4.7.17.5 is vulnerable to stored XSS due to the lack of filtration of user-supplied data in the liability name field. The JavaScript code is executed upon an error condition during a visit to the account show page. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/firefly-iii/firefly-iii/commit/8717f469b10e9f7e1547c6f70f7d24e1359d28d4"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/firefly-iii/firefly-iii/issues/2370"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:firefly-iii:firefly_iii:4.7.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3ED9EAF7-33DD-4D25-B7DD-6AA4D24D5E57",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,373 |
CVE-2016-10776 | 2019-08-06T13:15:11.153 | cPanel before 60.0.25 allows stored XSS during the homedir removal phase of WHM Account termination (SEC-174). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,374 |
CVE-2016-10777 | 2019-08-06T13:15:11.260 | cPanel before 60.0.25 allows self XSS in WHM Tweak Settings for autodiscover_host (SEC-177). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,375 |
CVE-2016-10778 | 2019-08-06T13:15:11.307 | cPanel before 60.0.25 allows self stored XSS in the listftpstable API (SEC-178). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,376 |
CVE-2016-10779 | 2019-08-06T13:15:11.370 | cPanel before 60.0.25 allows stored XSS in api1_listautoresponders (SEC-179). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://news.cpanel.com/cpanel-tsr-2016-0006-full-disclosure/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,377 |
CVE-2016-10780 | 2019-08-06T13:15:11.450 | cPanel before 60.0.25 allows stored XSS in the ftp_sessions API (SEC-180). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,378 |
CVE-2016-10781 | 2019-08-06T13:15:11.510 | cPanel before 60.0.25 allows self XSS in the UI_confirm API (SEC-180). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,379 |
CVE-2016-10782 | 2019-08-06T13:15:11.590 | cPanel before 60.0.25 allows self stored XSS in postgres API1 listdbs (SEC-181). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,380 |
CVE-2016-10783 | 2019-08-06T13:15:11.667 | cPanel before 60.0.25 allows self stored XSS in SSL_listkeys (SEC-182). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,381 |
CVE-2016-10784 | 2019-08-06T13:15:11.777 | cPanel before 60.0.25 allows self XSS in the alias upload interface (SEC-184). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,382 |
CVE-2016-10785 | 2019-08-06T13:15:11.857 | cPanel before 60.0.25 allows attackers to discover file contents during file copy operations (SEC-185). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,383 |
CVE-2016-10786 | 2019-08-06T13:15:11.903 | cPanel before 60.0.25 allows members of the nobody group to read Apache HTTP Server SSL keys (SEC-186). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,384 |
CVE-2016-10787 | 2019-08-06T13:15:11.997 | The Host Access Control feature in cPanel before 60.0.25 mishandles actionless host.deny entries (SEC-187). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,385 |
CVE-2016-10788 | 2019-08-06T13:15:12.057 | cPanel before 60.0.25 allows arbitrary code execution via Maketext in PostgreSQL adminbin (SEC-188). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,386 |
CVE-2016-10789 | 2019-08-06T13:15:12.137 | cPanel before 60.0.25 allows code execution via the cpsrvd 403 error response handler (SEC-191). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,387 |
CVE-2016-10790 | 2019-08-06T13:15:12.183 | cPanel before 60.0.25 does not use TLS for HTTP POSTs to listinput.cpanel.net (SEC-192). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9261E225-7FB2-4697-825C-DCA471CB55F5",
"versionEndExcluding": "11.54.0.33",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B46DB7-A830-4BC4-BF21-DC33259D3D8F",
"versionEndExcluding": "56.0.39",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE5EA15-8E28-4DC1-962C-224CA3763A40",
"versionEndExcluding": "58.0.37",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB360EE1-3891-41E8-924C-FB985FF3B079",
"versionEndExcluding": "60.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,388 |
CVE-2019-14690 | 2019-08-06T13:15:12.357 | AdPlug 2.3.1 has a heap-based buffer overflow in CxadbmfPlayer::__bmf_convert_stream() in bmf.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/adplug/adplug/issues/85"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q32A64R2APAC5PXIMSYIEFDQX5AD4GAS/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3PW6PLDTPSQQRHKTU2FB72SUB4Q66NE/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adplug_project:adplug:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F8E042B0-0F5C-4370-9F20-EE741349CAE2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,389 |
CVE-2019-14691 | 2019-08-06T13:15:12.417 | AdPlug 2.3.1 has a heap-based buffer overflow in CdtmLoader::load() in dtm.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/adplug/adplug/issues/86"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q32A64R2APAC5PXIMSYIEFDQX5AD4GAS/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3PW6PLDTPSQQRHKTU2FB72SUB4Q66NE/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adplug_project:adplug:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F8E042B0-0F5C-4370-9F20-EE741349CAE2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,390 |
CVE-2019-14692 | 2019-08-06T13:15:12.510 | AdPlug 2.3.1 has a heap-based buffer overflow in CmkjPlayer::load() in mkj.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/adplug/adplug/issues/87"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q32A64R2APAC5PXIMSYIEFDQX5AD4GAS/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3PW6PLDTPSQQRHKTU2FB72SUB4Q66NE/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adplug_project:adplug:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F8E042B0-0F5C-4370-9F20-EE741349CAE2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,391 |
CVE-2016-10791 | 2019-08-06T14:15:11.330 | cPanel before 60.0.15 does not ensure that system accounts lack a valid password, so that logins are impossible (CPANEL-9559). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94CBEF90-D1C6-4E12-8117-164F42A89DD9",
"versionEndExcluding": "60.0.15",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,392 |
CVE-2016-10792 | 2019-08-06T14:15:11.410 | cPanel before 59.9999.145 allows code execution in the context of other accounts via mailman list archives (SEC-141). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3DBE994D-E107-4384-98AC-FE42A4BEBE68",
"versionEndExcluding": "11.52.6.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.51.9999.98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AF87F9-CFA5-4942-B62E-A0C032D86510",
"versionEndExcluding": "11.54.0.29",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D5A07E2-FF68-4F7B-AE0B-EA7BB2710D32",
"versionEndExcluding": "56.0.34",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0244CA83-34E0-435A-94AA-3D84151A4CD0",
"versionEndExcluding": "58.0.29",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8FC3C7FC-99F6-4307-BE35-08C4E2ABBA2E",
"versionEndExcluding": "59.9999.145",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,393 |
CVE-2016-10793 | 2019-08-06T14:15:11.487 | cPanel before 59.9999.145 allows arbitrary code execution due to an incorrect #! in Mail::SPF scripts (SEC-152). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3DBE994D-E107-4384-98AC-FE42A4BEBE68",
"versionEndExcluding": "11.52.6.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.51.9999.98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AF87F9-CFA5-4942-B62E-A0C032D86510",
"versionEndExcluding": "11.54.0.29",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D5A07E2-FF68-4F7B-AE0B-EA7BB2710D32",
"versionEndExcluding": "56.0.34",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0244CA83-34E0-435A-94AA-3D84151A4CD0",
"versionEndExcluding": "58.0.29",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8FC3C7FC-99F6-4307-BE35-08C4E2ABBA2E",
"versionEndExcluding": "59.9999.145",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,394 |
CVE-2016-10794 | 2019-08-06T14:15:11.580 | cPanel before 59.9999.145 allows arbitrary file-read operations because of a multipart form processing error (SEC-154). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3DBE994D-E107-4384-98AC-FE42A4BEBE68",
"versionEndExcluding": "11.52.6.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.51.9999.98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AF87F9-CFA5-4942-B62E-A0C032D86510",
"versionEndExcluding": "11.54.0.29",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D5A07E2-FF68-4F7B-AE0B-EA7BB2710D32",
"versionEndExcluding": "56.0.34",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0244CA83-34E0-435A-94AA-3D84151A4CD0",
"versionEndExcluding": "58.0.29",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8FC3C7FC-99F6-4307-BE35-08C4E2ABBA2E",
"versionEndExcluding": "59.9999.145",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,395 |
CVE-2016-10795 | 2019-08-06T14:15:11.660 | cPanel before 59.9999.145 allows stored XSS in the WHM tail_upcp2.cgi interface (SEC-156). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/60+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3DBE994D-E107-4384-98AC-FE42A4BEBE68",
"versionEndExcluding": "11.52.6.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.51.9999.98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AF87F9-CFA5-4942-B62E-A0C032D86510",
"versionEndExcluding": "11.54.0.29",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D5A07E2-FF68-4F7B-AE0B-EA7BB2710D32",
"versionEndExcluding": "56.0.34",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0244CA83-34E0-435A-94AA-3D84151A4CD0",
"versionEndExcluding": "58.0.29",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8FC3C7FC-99F6-4307-BE35-08C4E2ABBA2E",
"versionEndExcluding": "59.9999.145",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "59.9999.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,396 |
CVE-2016-10796 | 2019-08-06T14:15:11.753 | cPanel before 58.0.4 initially uses weak permissions for Apache HTTP Server log files (SEC-130). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/58+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF36B181-4DE9-4D36-AC5D-31B2F4E6F2D7",
"versionEndExcluding": "11.52.6.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.51.9999.98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "315E7D30-1B7E-43A2-A405-FAED84DEA24C",
"versionEndExcluding": "11.54.0.26",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.54.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84E59834-A31B-4BBD-AA31-C85BA27E1BBB",
"versionEndExcluding": "56.0.27",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2F2220C8-D448-4F18-B279-8079FA963005",
"versionEndExcluding": "58.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,397 |
CVE-2016-10797 | 2019-08-06T14:15:11.877 | cPanel before 58.0.4 allows WHM "Purchase and Install an SSL Certificate" page visitors to list all server domains (SEC-133). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://documentation.cpanel.net/display/CL/58+Change+Log"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84E59834-A31B-4BBD-AA31-C85BA27E1BBB",
"versionEndExcluding": "56.0.27",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "55.9999.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2F2220C8-D448-4F18-B279-8079FA963005",
"versionEndExcluding": "58.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "57.9999.48",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,398 |
CVE-2019-14695 | 2019-08-06T14:15:12.020 | A SQL injection vulnerability exists in the Sygnoos Popup Builder plugin before 3.45 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system via com/libs/Table.php because Subscribers Table ordering is mishandled. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://fortiguard.com/zeroday/FG-VD-19-102"
},
{
"source": "[email protected]",
"tags": [
"Release Notes"
],
"url": "https://wordpress.org/plugins/popup-builder/#developers"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://wpvulndb.com/vulnerabilities/9495"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sygnoos:popup_builder:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "7E6D3AF4-C45D-49F4-BF46-D0A84AE77B28",
"versionEndExcluding": "3.45",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,399 |
CVE-2019-14346 | 2019-08-06T15:15:13.713 | Internal/Views/config.php in Schben Adive 2.0.7 allows admin/config CSRF to change a user password. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/153989/Adive-Framework-2.0.7-Cross-Site-Request-Forgery.html"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://hackpuntes.com/cve-2019-14346-adive-framework-2-0-7-cross-site-request-forgery/"
},
{
"source": "[email protected]",
"tags": [
"Product"
],
"url": "https://www.adive.es/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:schben:adive:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "18C41C4A-D3AB-4216-86EC-0F524FE626CD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,400 |
CVE-2019-14696 | 2019-08-06T16:15:11.640 | Open-School 3.0, and Community Edition 2.3, allows XSS via the osv/index.php?r=students/guardians/create id parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/153984/Open-School-3.0-Community-Edition-2.3-Cross-Site-Scripting.html"
},
{
"source": "[email protected]",
"tags": [
"Product"
],
"url": "https://open-school.org"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://pastebin.com/AgxqdbAQ"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:open-school:open-school:2.3:*:*:*:community:*:*:*",
"matchCriteriaId": "A33DEB7C-3FE8-45D5-8B68-212E18CB1858",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:open-school:open-school:3.0:*:*:*:-:*:*:*",
"matchCriteriaId": "9A2F6D5E-286F-46C9-9B97-D1B1D36F5347",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,401 |
CVE-2019-14697 | 2019-08-06T16:15:11.720 | musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/08/06/4"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202003-13"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "https://www.openwall.com/lists/musl/2019/08/06/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:musl-libc:musl:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "23FA698D-D2B6-434C-8063-E5999EA41D40",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.23",
"versionStartExcluding": null,
"versionStartIncluding": "0.9.12",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,402 |
CVE-2019-12950 | 2019-08-06T17:15:43.837 | An issue was discovered in TeamPass 2.1.27.35. From the sources/items.queries.php "Import items" feature, it is possible to load a crafted CSV file with an XSS payload. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nilsteampassnet/TeamPass/issues/2638"
},
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/nilsteampassnet/TeamPass/releases"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:teampass:teampass:2.1.27.35:*:*:*:*:*:*:*",
"matchCriteriaId": "89FC0190-8E89-4809-86A9-B251619DC27E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,403 |
CVE-2019-14347 | 2019-08-06T17:15:43.900 | Internal/Views/addUsers.php in Schben Adive 2.0.7 allows remote unprivileged users (editor or developer) to create an administrator account via admin/user/add, as demonstrated by a Python PoC script. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/155213/Adive-Framework-2.0.7-Privilege-Escalation.html"
},
{
"source": "[email protected]",
"tags": [
"Broken Link"
],
"url": "https://github.com/ferdinandmartin/adive-php"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://hackpuntes.com/cve-2019-14347-escalacion-de-privilegios-en-adive/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:schben:adive:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2A1F36E-8446-4B07-8A23-7BBF7F1F7515",
"versionEndExcluding": null,
"versionEndIncluding": "2.0.7",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,404 |
CVE-2019-13143 | 2019-08-06T18:15:11.267 | An HTTP parameter pollution issue was discovered on Shenzhen Dragon Brothers Fingerprint Bluetooth Round Padlock FB50 2.3. With the user ID, user name, and the lock's MAC address, anyone can unbind the existing owner of the lock, and bind themselves instead. This leads to complete takeover of the lock. The user ID, name, and MAC address are trivially obtained from APIs found within the Android or iOS application. With only the MAC address of the lock, any attacker can transfer ownership of the lock from the current user, over to the attacker's account. Thus rendering the lock completely inaccessible to the current user. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 8.5,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://blog.securelayer7.net/fb50-smart-lock-vulnerability-disclosure/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:shenzhen_dragon_brothers:fb50_firmware:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F86EC9A3-303A-46B6-9F56-B90615C2579C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:shenzhen_dragon_brothers:fb50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EA162C8-6383-47CC-9418-1D0852F7362F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | 10,405 |
CVE-2019-13104 | 2019-08-06T19:15:13.253 | In Das U-Boot versions 2016.11-rc1 through 2019.07-rc4, an underflow can cause memcpy() to overwrite a very large amount of data (including the whole stack) while reading a crafted ext4 filesystem. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00002.html"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00004.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/u-boot/u-boot/commits/master"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://lists.denx.de/pipermail/u-boot/2019-July/375514.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6671B486-515C-4F5D-B286-7B473109B301",
"versionEndExcluding": null,
"versionEndIncluding": "2019.04",
"versionStartExcluding": null,
"versionStartIncluding": "2016.09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:denx:u-boot:2019.07:-:*:*:*:*:*:*",
"matchCriteriaId": "01EA00F5-7A9D-4EB9-A852-047EA72084E8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:denx:u-boot:2019.07:rc1:*:*:*:*:*:*",
"matchCriteriaId": "75689E3C-FBB6-46B5-B59C-41D244702158",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:denx:u-boot:2019.07:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9358D79B-256E-4AEA-BE6B-A182AA4AE861",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:denx:u-boot:2019.07:rc3:*:*:*:*:*:*",
"matchCriteriaId": "6AAFACF6-606C-4429-B680-01D3C4A98BC1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:denx:u-boot:2019.07:rc4:*:*:*:*:*:*",
"matchCriteriaId": "27B38F3B-75C0-4067-857F-C78160493D17",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,406 |
CVE-2019-14473 | 2019-08-06T19:15:13.410 | eQ-3 Homematic CCU2 and CCU3 use session IDs for authentication but lack authorization checks. Consequently, a valid guest level or user level account can create a new admin level account, read the service messages, clear the system protocol or modify/delete internal programs, etc. pp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://psytester.github.io/CVE-2019-14473"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:eq-3:ccu2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CBFCAA60-2021-4DAE-B9DA-A4C45ACD286D",
"versionEndExcluding": null,
"versionEndIncluding": "2.47.15",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:eq-3:ccu2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "125CA411-3433-4848-8EBC-E94808C862FB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9ECA4670-4D98-43C1-A1F4-6F77B14423E4",
"versionEndExcluding": null,
"versionEndIncluding": "3.47.15",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:eq-3:ccu3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DAEB3E1D-3D34-4B6D-AC9F-F0F28370050A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | 10,407 |
CVE-2019-2386 | 2019-08-06T19:15:13.613 | After user deletion in MongoDB Server the improper invalidation of authorization sessions allows an authenticated user's session to persist and become conflated with new accounts, if those accounts reuse the names of deleted ones. This issue affects MongoDB Server v4.0 versions prior to 4.0.9; MongoDB Server v3.6 versions prior to 3.6.13 and MongoDB Server v3.4 versions prior to 3.4.22.
Workaround:
After deleting one or more users, restart any nodes which may have had active user authorization sessions.
Refrain from creating user accounts with the same name as previously deleted accounts.
| {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Secondary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://jira.mongodb.org/browse/SERVER-38984"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0829"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56AB583F-49FA-4EBD-A1CD-EB9A0853F8F8",
"versionEndExcluding": "3.4.22",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "3.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7E74086E-F8F7-438B-8E70-CDF068C7AEE5",
"versionEndExcluding": "3.6.13",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "3.6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5544C87-6AF1-43C2-A05E-7D714322D4DB",
"versionEndExcluding": "4.0.9",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | 10,408 |
CVE-2019-5994 | 2019-08-06T19:15:13.880 | Buffer overflow in PTP (Picture Transfer Protocol) of EOS series digital cameras (EOS-1D X firmware version 2.1.0 and earlier, EOS-1D X MKII firmware version 1.1.6 and earlier, EOS-1D C firmware version 1.4.1 and earlier, EOS 5D MARK III firmware version 1.3.5 and earlier, EOS 5D MARK IV firmware version 1.2.0 and earlier, EOS 5DS firmware version 1.1.2 and earlier, EOS 5DS R firmware version 1.1.2 and earlier, EOS 6D firmware version 1.1.8 and earlier, EOS 6D MARK II firmware version 1.0.4 and earlier, EOS 7D MARK II firmware version 1.1.2 and earlier, EOS 70 D firmware version 1.1.2 and earlier, EOS 80 D firmware version 1.0.2 and earlier, EOS KISS X7I / EOS D REBEL T5I / EOS 700D firmware version 1.1.5 and earlier, EOS KISS X8I / EOS D REBEL T6I / EOS 750D firmware version 1.0.0 and earlier, EOS KISS X9I / EOS D REBEL T7I / EOS 800D firmware version 1.0.1 and earlier, EOS KISS X7 / EOS D REBEL SL1 / EOS 100D firmware version 1.0.1 and earlier, EOS KISS X9 / EOS D REBEL SL2 / EOS 200D firmware version 1.0.1 and earlier, EOS KISS X10 / EOS D REBEL SL3 / EOS 200D / EOS 250D firmware version 1.0.1 and earlier, EOS 8000D / EOS D REBEL T6S / EOS 760D firmware version 1.0.0 and earlier, EOS 9000D / EOS 77D firmware version 1.0.2 and earlier, EOS KISS X70 / EOS D REBEL T5 / EOS 1200D firmware version 1.0.2 and earlier, EOS D REBEL T5 RE / EOS 1200D MG / EOS HI firmware version 1.0.2 and earlier, EOS KISS X80 / EOS D REBEL T6 / EOS 1300D firmware version 1.1.0 and earlier, EOS KISS X90 / EOS D REBEL T7 / EOS 1500D / EOS 2000D firmware version 1.0.0 and earlier, EOS D REBEL T100 / EOS 3000D / EOS 4000D firmware version 1.0.0 and earlier, EOS R firmware version 1.3.0 and earlier, EOS RP firmware version 1.2.0 and earlier, EOS RP GOLD firmware version 1.2.0 and earlier, EOS M2 firmware version 1.0.3 and earlier, EOS M3 firmware version 1.2.0 and earlier, EOS M5 firmware version 1.0.1 and earlier, EOS M6 firmware version 1.0.1 and earlier, EOS M6(China) firmware version 5.0.0 and earlier, EOS M10 firmware version 1.1.0 and earlier, EOS M100 firmware version 1.0.0 and earlier, EOS KISS M / EOS M50 firmware version 1.0.2 and earlier) and PowerShot SX740 HS firmware version 1.0.1 and earlier, PowerShot SX70 HS firmware version 1.1.0 and earlier, and PowerShot G5Xmark II firmware version 1.0.1 and earlier allows an attacker on the same network segment to trigger the affected product being unresponsive or to execute arbitrary code on the affected product via SendObjectInfo command. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/vu/JVNVU97511331/index.html"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://cweb.canon.jp/e-support/products/eos-d/190806dilc-firm.html"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.canon-europe.com/support/product-security/"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.usa.canon.com/internet/portal/us/home/support/product-advisories/detail/the-vulnerability-in-canon-digital-cameras"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B41EAE-6CFC-4142-947F-9570416B8430",
"versionEndExcluding": null,
"versionEndIncluding": "2.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D900D931-52FA-4A7C-B1F0-4ED7FF16B590",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_x_mkii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "115C8AE1-7F4E-4F4C-B6E0-8BACCB058E0F",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.6",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_x_mkii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A01C7E96-4DEC-4153-B5B4-AA5A73DA8EAE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE43279D-728C-457D-99D2-9FE0F1AE89EE",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B883DD17-1FAB-463A-A697-595F47C17629",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5d_mark_iii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC81188A-A334-4BE4-8382-91ADC6678473",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5d_mark_iii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "489E40A9-5999-47AA-A527-C54E509C724B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5d_mark_iv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "060396F2-96C0-4058-B671-85B9FBEB007B",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5d_mark_iv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F8DEB8B-9CC8-4E67-B059-3556720BF83B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5ds_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A545F7D1-97BA-495B-BE15-7F1DB1DD5BEC",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5ds:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52F07C57-B580-4590-A8AB-7717052BDEFA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5ds_r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81092A79-2651-4E01-A5C1-FF1B79EC99AE",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5ds_r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE5DF31C-6D16-4BEE-968F-549786AEDD95",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_6d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "49FB54E4-B118-4DE6-93CE-BA703E0341DE",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.8",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_6d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FFA6C61-D190-460D-A7E0-EDC50DC6A47B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_7d_mark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C287C13F-2188-42E3-873A-3F8BF002FB9E",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_7d_mark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29EB7B3D-1BC5-44D7-9691-6161C9D0F637",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_70d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB2F1134-917A-430A-BB11-99D822045D0E",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_70d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9949BC8A-BA70-48F3-AEBD-9A3EE0B00E6B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_80d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75FBB900-929A-43DA-8DFA-8709D0CDCD2C",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_80d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78791BA-1FC4-423B-A51A-79201B3D835C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x7i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94517FFB-1A37-4921-8379-41A640BCB773",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x7i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3301D22-8BDC-4C8A-B4CD-6CF338DB8534",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16655C13-8EED-4F50-8D5E-A2E1DD45CC53",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04CD4A54-856A-4E97-AD00-EE662FD79F51",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_700d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BAA428E-E2DB-40B6-94B1-5DFFAE8445D9",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_700d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2986DD7-AEDB-416B-BF6E-E1A65AFB3D22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x8i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "313420F0-2076-416F-AE26-D81501D5D96A",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x8i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF28AD1-CF83-41FD-AF90-D9E58EB13AB0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D63EFD4-D98F-4066-A04E-C8332FDC88CB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "550C3683-14BA-4CE0-A518-8B748B179104",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_750d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1711827E-E6DC-4AEA-BB38-FE836C75F97D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_750d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE92DE01-9587-4B49-A30D-1ACFA21A1237",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x9i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9045D5D-84CB-4C89-BBEC-9DF4DF99C1EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x9i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4F7E5D8-0FE9-4B67-B6A4-F45B47429384",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t7i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E977062-3B82-4FC5-9289-808C2144D94E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t7i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AECEE371-A8BD-420E-B758-244CAD9037BB",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_800d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B1D3708-29DC-4153-9D7C-D21D1CCC8DAF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_800d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "881A3902-43E7-418C-A2A0-D25C2EDCD011",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DAD909A-A037-497E-B07F-914CB64E6A9F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDEC1E1-69BF-4551-96FF-BC9AB9D9BB9B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3EAADDF-F7AB-4C66-A2B9-40AC7452D372",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D8A4070-548E-4425-A46F-2EE6BB65B119",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_100d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "466391FD-1F08-4DA0-8404-C041599C1366",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_100d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28B213ED-9472-4E3A-9E05-70AB24207966",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x9_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BB22EC-5BC8-45FB-8E52-086812BC1546",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6B9C1F-974B-44E4-9BA1-6D31089E13EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "726F2082-AB0E-4E37-96AD-80B4237B438B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CE3620C-45D8-4A91-9350-9CC2B30D3796",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F06FEE37-9060-4B79-A24E-BACBC19E0FDF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C9F004-59CC-47A7-B308-C918DA1C3103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F876428-9FB9-4C50-8873-CCEA75AFB426",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3D0A03-8ABE-4EB3-AAAD-1E1DA29C14BD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20AD1E6B-B9A2-493E-B075-5D18F2E8E53F",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9BF9B43-803C-45EC-8B45-22C6CCE1CC3B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F06FEE37-9060-4B79-A24E-BACBC19E0FDF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C9F004-59CC-47A7-B308-C918DA1C3103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_250d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57693A68-0B3E-4DE5-B563-DA124199EDF3",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_250d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B81633B6-8CE2-4D83-92E3-634756127620",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_8000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0C89004-64CF-4B49-9D69-313A2D56F339",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_8000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B301D4DB-1EF8-4162-83EB-66B533052047",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF427FA-1455-4CDF-8E69-E5A3543E5728",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF0A7AA-A115-4110-8E72-746C00CC4033",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_760d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57B53943-4AEB-4AD9-8E34-AF64B96A6D68",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_760d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A40C05-C50F-4D73-B640-782B07DFE9AB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_9000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D2A3393-3DB9-4B83-9F32-4FAD1C66D35D",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_9000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3802327-3156-45A7-827D-C94CD68AC389",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_77d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11C783F5-81D9-4C9D-8D24-DBB0BBA6DEAC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_77d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A6FAAC-1362-496F-9567-C168E90B29B7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x70_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EA6C79B-E124-4CB9-ACA9-85F939B1701B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x70:-:*:*:*:*:*:*:*",
"matchCriteriaId": "133D14D9-4A81-4FE4-96E4-15E741903C84",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7957441E-8476-4E0A-8E12-1D6ABBBD0B4E",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39E9A117-A0F6-4C79-9D66-2EED88883010",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E5064C5-51C1-412C-8145-8561C3592D8B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F141B5D-70AD-41ED-BEA0-A880A6B415AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5_re_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79296E01-0977-4A46-B54E-38E08FC640F9",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5_re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0165438-12A3-40E4-9FB0-B57EC1CAB6CA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1200d_mg_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "022D3E5E-1109-44C7-AB63-489C11AE89FE",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1200d_mg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30073057-8B4F-4A85-A062-DABFE3816821",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_hi_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1CB6DE0-E9E3-47E1-9DD6-217F00F911C9",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_hi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B37853E-DA5B-468A-9E2A-B7DA45F5338E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x80_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0292A9A-81D2-4834-BB56-03D4D1F70E8F",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x80:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53F32AEE-9C79-4449-89F9-36ACF5ACCAAF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "032CEA19-3687-4687-BBE3-6E42C816DA09",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB28EBA9-8BC9-48FF-A858-69D866FBEE63",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1300d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C23F53-7875-466D-8750-154FDF85B4B5",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1300d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62C62C20-695C-4E7E-A0DE-D205131B7406",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x90_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2AE5E5B6-8A75-4FC0-B161-2BEC0A36B359",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x90:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9E4CED-A511-498F-AB15-FDDB2BC5DE0C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3CA9BF4-6A9B-4E17-999F-F6F738699116",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8ACA7F44-9F78-40CE-BDA7-96013B3BD137",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1500d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD5DCC6-06C0-43ED-8CC7-D8C0F5E2134F",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1500d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F289482-2B2A-40A3-B473-268B38E4864F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_2000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D2B3E84-00C6-4371-8A41-459B49D63606",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_2000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D36E69CD-A095-4D3E-A86F-9F0AA0FA6F91",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E792C6AE-52B7-4075-9FB3-A54C027FD351",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC96B6D1-6EF5-4483-A27B-E3D91A803420",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_3000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23C1956F-B3F7-47D7-B85D-408F78283623",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_3000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F93BF881-57E7-4EC2-99B6-6D0454A3B67A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_4000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D87306A6-AF3F-4B90-9C47-4A61E25F273C",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_4000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54316C9A-0BF3-43EF-AF01-97E453E08B84",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE65951A-B6AC-4719-BD29-B6D6B02CDBDE",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B5B8A44-8511-41E9-8AD1-B44F2524FD8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_rp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07864E4A-DFC2-4F94-86FE-F64C5825DC70",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_rp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85C1EC49-5691-42A0-AD48-7612674F95C2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_rp_gold_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF3923BA-A7B1-4167-AE79-7632C443C2BE",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_rp_gold:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F36D91E0-13C1-4465-9B7E-9F465F53AEC8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F62AD1C8-6487-4B84-8879-5262801051F1",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.3",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE706B6-F706-45BB-95E5-7CBA3C186BA9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEA9741C-B1B7-4552-8952-BD9D7B00DF58",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0E26818-C97C-4551-A06A-41FD51202FC7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F020BDB5-7012-4DEB-A60F-B65492F4C7CF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D09A072-28A0-4E1B-9627-EC23166DE09E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m6_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6120F799-2FF3-4DFF-91EF-80B345F96111",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C2D504-1CE1-45D2-B09F-48D89D7C4587",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m6\\(china\\)_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4382BB-51E7-486C-AFBC-2B559905DFBC",
"versionEndExcluding": null,
"versionEndIncluding": "5.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m6\\(china\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "DED4A602-417C-47C6-B78F-5C1D14AF0A33",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9CC311-58D9-450F-B204-C9215A604358",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1A1144-77DA-4BF9-84F4-273BFEB3C626",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E99864D-6BA3-4136-87AA-7FE2C5462F94",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "082679E2-82A8-4501-9866-B3335CE2090F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_m_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3927F40-B5E5-4076-8990-0FB44853D6AC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF443D78-4C04-4276-BA8E-BE2ADC368287",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15728BA0-702E-4A87-B20F-00B79D938A75",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D929C30A-59C4-43F0-B928-941454D9F6D2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_sx740_hs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50564BC7-F034-4B96-9590-34A1714A61E8",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_sx740_hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "396924EF-075F-48D5-80FF-723A4418F1DD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_sx70_hs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "412BF37C-129C-46DB-87B6-AF0DFF6D6EEA",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_sx70_hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8EA82F6-BC50-4F75-AB50-F0DAECFA8CCC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_g5xmark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A7465D6-F425-4B46-91B8-2A3FCEF0B0FC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_g5xmark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC2077A-2038-4C4B-82AC-D55B24C37D41",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_6d_mark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37D03B7E-31D1-4DAB-8AB5-A6119E5B9C70",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.4",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_6d_mark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29A0F9B9-4660-4B49-BE56-1BECA639215F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | 10,409 |
CVE-2019-5995 | 2019-08-06T19:15:14.193 | Missing authorization vulnerability exists in EOS series digital cameras (EOS-1D X firmware version 2.1.0 and earlier, EOS-1D X MKII firmware version 1.1.6 and earlier, EOS-1D C firmware version 1.4.1 and earlier, EOS 5D MARK III firmware version 1.3.5 and earlier, EOS 5D MARK IV firmware version 1.2.0 and earlier, EOS 5DS firmware version 1.1.2 and earlier, EOS 5DS R firmware version 1.1.2 and earlier, EOS 6D firmware version 1.1.8 and earlier, EOS 6D MARK II firmware version 1.0.4 and earlier, EOS 7D MARK II firmware version 1.1.2 and earlier, EOS 70 D firmware version 1.1.2 and earlier, EOS 80 D firmware version 1.0.2 and earlier, EOS KISS X7I / EOS D REBEL T5I / EOS 700D firmware version 1.1.5 and earlier, EOS KISS X8I / EOS D REBEL T6I / EOS 750D firmware version 1.0.0 and earlier, EOS KISS X9I / EOS D REBEL T7I / EOS 800D firmware version 1.0.1 and earlier, EOS KISS X7 / EOS D REBEL SL1 / EOS 100D firmware version 1.0.1 and earlier, EOS KISS X9 / EOS D REBEL SL2 / EOS 200D firmware version 1.0.1 and earlier, EOS KISS X10 / EOS D REBEL SL3 / EOS 200D / EOS 250D firmware version 1.0.1 and earlier, EOS 8000D / EOS D REBEL T6S / EOS 760D firmware version 1.0.0 and earlier, EOS 9000D / EOS 77D firmware version 1.0.2 and earlier, EOS KISS X70 / EOS D REBEL T5 / EOS 1200D firmware version 1.0.2 and earlier, EOS D REBEL T5 RE / EOS 1200D MG / EOS HI firmware version 1.0.2 and earlier, EOS KISS X80 / EOS D REBEL T6 / EOS 1300D firmware version 1.1.0 and earlier, EOS KISS X90 / EOS D REBEL T7 / EOS 1500D / EOS 2000D firmware version 1.0.0 and earlier, EOS D REBEL T100 / EOS 3000D / EOS 4000D firmware version 1.0.0 and earlier, EOS R firmware version 1.3.0 and earlier, EOS RP firmware version 1.2.0 and earlier, EOS RP GOLD firmware version 1.2.0 and earlier, EOS M2 firmware version 1.0.3 and earlier, EOS M3 firmware version 1.2.0 and earlier, EOS M5 firmware version 1.0.1 and earlier, EOS M6 firmware version 1.0.1 and earlier, EOS M6(China) firmware version 5.0.0 and earlier, EOS M10 firmware version 1.1.0 and earlier, EOS M100 firmware version 1.0.0 and earlier, EOS KISS M / EOS M50 firmware version 1.0.2 and earlier) and PowerShot SX740 HS firmware version 1.0.1 and earlier, PowerShot SX70 HS firmware version 1.1.0 and earlier, and PowerShot G5Xmark II firmware version 1.0.1 and earlier. A successful exploitation may result in a specially crafted firmware update or unofficial firmware update being applied without user's consent via unspecified vector. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/vu/JVNVU97511331/index.html"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://cweb.canon.jp/e-support/products/eos-d/190806dilc-firm.html"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.canon-europe.com/support/product-security/"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.usa.canon.com/internet/portal/us/home/support/product-advisories/detail/the-vulnerability-in-canon-digital-cameras"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B41EAE-6CFC-4142-947F-9570416B8430",
"versionEndExcluding": null,
"versionEndIncluding": "2.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D900D931-52FA-4A7C-B1F0-4ED7FF16B590",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_x_mkii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "115C8AE1-7F4E-4F4C-B6E0-8BACCB058E0F",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.6",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_x_mkii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A01C7E96-4DEC-4153-B5B4-AA5A73DA8EAE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE43279D-728C-457D-99D2-9FE0F1AE89EE",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B883DD17-1FAB-463A-A697-595F47C17629",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5d_mark_iii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC81188A-A334-4BE4-8382-91ADC6678473",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5d_mark_iii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "489E40A9-5999-47AA-A527-C54E509C724B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5d_mark_iv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "060396F2-96C0-4058-B671-85B9FBEB007B",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5d_mark_iv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F8DEB8B-9CC8-4E67-B059-3556720BF83B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5ds_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A545F7D1-97BA-495B-BE15-7F1DB1DD5BEC",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5ds:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52F07C57-B580-4590-A8AB-7717052BDEFA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5ds_r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81092A79-2651-4E01-A5C1-FF1B79EC99AE",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5ds_r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE5DF31C-6D16-4BEE-968F-549786AEDD95",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_6d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "49FB54E4-B118-4DE6-93CE-BA703E0341DE",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.8",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_6d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FFA6C61-D190-460D-A7E0-EDC50DC6A47B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_7d_mark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C287C13F-2188-42E3-873A-3F8BF002FB9E",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_7d_mark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29EB7B3D-1BC5-44D7-9691-6161C9D0F637",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_70d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB2F1134-917A-430A-BB11-99D822045D0E",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_70d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9949BC8A-BA70-48F3-AEBD-9A3EE0B00E6B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_80d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75FBB900-929A-43DA-8DFA-8709D0CDCD2C",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_80d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78791BA-1FC4-423B-A51A-79201B3D835C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x7i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94517FFB-1A37-4921-8379-41A640BCB773",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x7i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3301D22-8BDC-4C8A-B4CD-6CF338DB8534",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16655C13-8EED-4F50-8D5E-A2E1DD45CC53",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04CD4A54-856A-4E97-AD00-EE662FD79F51",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_700d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BAA428E-E2DB-40B6-94B1-5DFFAE8445D9",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_700d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2986DD7-AEDB-416B-BF6E-E1A65AFB3D22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x8i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "313420F0-2076-416F-AE26-D81501D5D96A",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x8i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF28AD1-CF83-41FD-AF90-D9E58EB13AB0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "550C3683-14BA-4CE0-A518-8B748B179104",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D63EFD4-D98F-4066-A04E-C8332FDC88CB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_750d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE92DE01-9587-4B49-A30D-1ACFA21A1237",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_750d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1711827E-E6DC-4AEA-BB38-FE836C75F97D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x9i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4F7E5D8-0FE9-4B67-B6A4-F45B47429384",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x9i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9045D5D-84CB-4C89-BBEC-9DF4DF99C1EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t7i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AECEE371-A8BD-420E-B758-244CAD9037BB",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t7i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E977062-3B82-4FC5-9289-808C2144D94E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_800d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "881A3902-43E7-418C-A2A0-D25C2EDCD011",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_800d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B1D3708-29DC-4153-9D7C-D21D1CCC8DAF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDEC1E1-69BF-4551-96FF-BC9AB9D9BB9B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DAD909A-A037-497E-B07F-914CB64E6A9F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D8A4070-548E-4425-A46F-2EE6BB65B119",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3EAADDF-F7AB-4C66-A2B9-40AC7452D372",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_100d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "466391FD-1F08-4DA0-8404-C041599C1366",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_100d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28B213ED-9472-4E3A-9E05-70AB24207966",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x9_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BB22EC-5BC8-45FB-8E52-086812BC1546",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6B9C1F-974B-44E4-9BA1-6D31089E13EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "726F2082-AB0E-4E37-96AD-80B4237B438B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CE3620C-45D8-4A91-9350-9CC2B30D3796",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F06FEE37-9060-4B79-A24E-BACBC19E0FDF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C9F004-59CC-47A7-B308-C918DA1C3103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F876428-9FB9-4C50-8873-CCEA75AFB426",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3D0A03-8ABE-4EB3-AAAD-1E1DA29C14BD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20AD1E6B-B9A2-493E-B075-5D18F2E8E53F",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9BF9B43-803C-45EC-8B45-22C6CCE1CC3B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F06FEE37-9060-4B79-A24E-BACBC19E0FDF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C9F004-59CC-47A7-B308-C918DA1C3103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_250d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57693A68-0B3E-4DE5-B563-DA124199EDF3",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_250d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B81633B6-8CE2-4D83-92E3-634756127620",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_8000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0C89004-64CF-4B49-9D69-313A2D56F339",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_8000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B301D4DB-1EF8-4162-83EB-66B533052047",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF427FA-1455-4CDF-8E69-E5A3543E5728",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF0A7AA-A115-4110-8E72-746C00CC4033",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_760d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57B53943-4AEB-4AD9-8E34-AF64B96A6D68",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_760d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A40C05-C50F-4D73-B640-782B07DFE9AB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_9000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D2A3393-3DB9-4B83-9F32-4FAD1C66D35D",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_9000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3802327-3156-45A7-827D-C94CD68AC389",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_77d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11C783F5-81D9-4C9D-8D24-DBB0BBA6DEAC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_77d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A6FAAC-1362-496F-9567-C168E90B29B7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x70_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EA6C79B-E124-4CB9-ACA9-85F939B1701B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x70:-:*:*:*:*:*:*:*",
"matchCriteriaId": "133D14D9-4A81-4FE4-96E4-15E741903C84",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7957441E-8476-4E0A-8E12-1D6ABBBD0B4E",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39E9A117-A0F6-4C79-9D66-2EED88883010",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E5064C5-51C1-412C-8145-8561C3592D8B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F141B5D-70AD-41ED-BEA0-A880A6B415AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5_re_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79296E01-0977-4A46-B54E-38E08FC640F9",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5_re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0165438-12A3-40E4-9FB0-B57EC1CAB6CA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1200d_mg_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "022D3E5E-1109-44C7-AB63-489C11AE89FE",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1200d_mg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30073057-8B4F-4A85-A062-DABFE3816821",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_hi_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1CB6DE0-E9E3-47E1-9DD6-217F00F911C9",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_hi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B37853E-DA5B-468A-9E2A-B7DA45F5338E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x80_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0292A9A-81D2-4834-BB56-03D4D1F70E8F",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x80:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53F32AEE-9C79-4449-89F9-36ACF5ACCAAF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "032CEA19-3687-4687-BBE3-6E42C816DA09",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB28EBA9-8BC9-48FF-A858-69D866FBEE63",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1300d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C23F53-7875-466D-8750-154FDF85B4B5",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1300d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62C62C20-695C-4E7E-A0DE-D205131B7406",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x90_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2AE5E5B6-8A75-4FC0-B161-2BEC0A36B359",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x90:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9E4CED-A511-498F-AB15-FDDB2BC5DE0C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3CA9BF4-6A9B-4E17-999F-F6F738699116",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8ACA7F44-9F78-40CE-BDA7-96013B3BD137",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1500d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD5DCC6-06C0-43ED-8CC7-D8C0F5E2134F",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1500d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F289482-2B2A-40A3-B473-268B38E4864F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_2000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D2B3E84-00C6-4371-8A41-459B49D63606",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_2000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D36E69CD-A095-4D3E-A86F-9F0AA0FA6F91",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E792C6AE-52B7-4075-9FB3-A54C027FD351",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC96B6D1-6EF5-4483-A27B-E3D91A803420",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_3000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23C1956F-B3F7-47D7-B85D-408F78283623",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_3000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F93BF881-57E7-4EC2-99B6-6D0454A3B67A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_4000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D87306A6-AF3F-4B90-9C47-4A61E25F273C",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_4000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54316C9A-0BF3-43EF-AF01-97E453E08B84",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE65951A-B6AC-4719-BD29-B6D6B02CDBDE",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B5B8A44-8511-41E9-8AD1-B44F2524FD8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_rp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07864E4A-DFC2-4F94-86FE-F64C5825DC70",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_rp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85C1EC49-5691-42A0-AD48-7612674F95C2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_rp_gold_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF3923BA-A7B1-4167-AE79-7632C443C2BE",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_rp_gold:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F36D91E0-13C1-4465-9B7E-9F465F53AEC8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F62AD1C8-6487-4B84-8879-5262801051F1",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.3",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE706B6-F706-45BB-95E5-7CBA3C186BA9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEA9741C-B1B7-4552-8952-BD9D7B00DF58",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0E26818-C97C-4551-A06A-41FD51202FC7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F020BDB5-7012-4DEB-A60F-B65492F4C7CF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D09A072-28A0-4E1B-9627-EC23166DE09E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m6_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6120F799-2FF3-4DFF-91EF-80B345F96111",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C2D504-1CE1-45D2-B09F-48D89D7C4587",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m6\\(china\\)_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4382BB-51E7-486C-AFBC-2B559905DFBC",
"versionEndExcluding": null,
"versionEndIncluding": "5.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m6\\(china\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "DED4A602-417C-47C6-B78F-5C1D14AF0A33",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9CC311-58D9-450F-B204-C9215A604358",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1A1144-77DA-4BF9-84F4-273BFEB3C626",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E99864D-6BA3-4136-87AA-7FE2C5462F94",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "082679E2-82A8-4501-9866-B3335CE2090F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_m_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3927F40-B5E5-4076-8990-0FB44853D6AC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF443D78-4C04-4276-BA8E-BE2ADC368287",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15728BA0-702E-4A87-B20F-00B79D938A75",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D929C30A-59C4-43F0-B928-941454D9F6D2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_sx740_hs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50564BC7-F034-4B96-9590-34A1714A61E8",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_sx740_hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "396924EF-075F-48D5-80FF-723A4418F1DD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_sx70_hs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "412BF37C-129C-46DB-87B6-AF0DFF6D6EEA",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_sx70_hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8EA82F6-BC50-4F75-AB50-F0DAECFA8CCC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_g5xmark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A7465D6-F425-4B46-91B8-2A3FCEF0B0FC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_g5xmark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC2077A-2038-4C4B-82AC-D55B24C37D41",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_6d_mark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37D03B7E-31D1-4DAB-8AB5-A6119E5B9C70",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.4",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_6d_mark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29A0F9B9-4660-4B49-BE56-1BECA639215F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | 10,410 |
CVE-2019-5998 | 2019-08-06T19:15:14.287 | Buffer overflow in PTP (Picture Transfer Protocol) of EOS series digital cameras (EOS-1D X firmware version 2.1.0 and earlier, EOS-1D X MKII firmware version 1.1.6 and earlier, EOS-1D C firmware version 1.4.1 and earlier, EOS 5D MARK III firmware version 1.3.5 and earlier, EOS 5D MARK IV firmware version 1.2.0 and earlier, EOS 5DS firmware version 1.1.2 and earlier, EOS 5DS R firmware version 1.1.2 and earlier, EOS 6D firmware version 1.1.8 and earlier, EOS 6D MARK II firmware version 1.0.4 and earlier, EOS 7D MARK II firmware version 1.1.2 and earlier, EOS 70 D firmware version 1.1.2 and earlier, EOS 80 D firmware version 1.0.2 and earlier, EOS KISS X7I / EOS D REBEL T5I / EOS 700D firmware version 1.1.5 and earlier, EOS KISS X8I / EOS D REBEL T6I / EOS 750D firmware version 1.0.0 and earlier, EOS KISS X9I / EOS D REBEL T7I / EOS 800D firmware version 1.0.1 and earlier, EOS KISS X7 / EOS D REBEL SL1 / EOS 100D firmware version 1.0.1 and earlier, EOS KISS X9 / EOS D REBEL SL2 / EOS 200D firmware version 1.0.1 and earlier, EOS KISS X10 / EOS D REBEL SL3 / EOS 200D / EOS 250D firmware version 1.0.1 and earlier, EOS 8000D / EOS D REBEL T6S / EOS 760D firmware version 1.0.0 and earlier, EOS 9000D / EOS 77D firmware version 1.0.2 and earlier, EOS KISS X70 / EOS D REBEL T5 / EOS 1200D firmware version 1.0.2 and earlier, EOS D REBEL T5 RE / EOS 1200D MG / EOS HI firmware version 1.0.2 and earlier, EOS KISS X80 / EOS D REBEL T6 / EOS 1300D firmware version 1.1.0 and earlier, EOS KISS X90 / EOS D REBEL T7 / EOS 1500D / EOS 2000D firmware version 1.0.0 and earlier, EOS D REBEL T100 / EOS 3000D / EOS 4000D firmware version 1.0.0 and earlier, EOS R firmware version 1.3.0 and earlier, EOS RP firmware version 1.2.0 and earlier, EOS RP GOLD firmware version 1.2.0 and earlier, EOS M2 firmware version 1.0.3 and earlier, EOS M3 firmware version 1.2.0 and earlier, EOS M5 firmware version 1.0.1 and earlier, EOS M6 firmware version 1.0.1 and earlier, EOS M6(China) firmware version 5.0.0 and earlier, EOS M10 firmware version 1.1.0 and earlier, EOS M100 firmware version 1.0.0 and earlier, EOS KISS M / EOS M50 firmware version 1.0.2 and earlier) and PowerShot SX740 HS firmware version 1.0.1 and earlier, PowerShot SX70 HS firmware version 1.1.0 and earlier, and PowerShot G5Xmark II firmware version 1.0.1 and earlier allows an attacker on the same network segment to trigger the affected product being unresponsive or to execute arbitrary code on the affected product via notifybtstatus command. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/vu/JVNVU97511331/index.html"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://cweb.canon.jp/e-support/products/eos-d/190806dilc-firm.html"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.canon-europe.com/support/product-security/"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.usa.canon.com/internet/portal/us/home/support/product-advisories/detail/the-vulnerability-in-canon-digital-cameras"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B41EAE-6CFC-4142-947F-9570416B8430",
"versionEndExcluding": null,
"versionEndIncluding": "2.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D900D931-52FA-4A7C-B1F0-4ED7FF16B590",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_x_mkii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "115C8AE1-7F4E-4F4C-B6E0-8BACCB058E0F",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.6",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_x_mkii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A01C7E96-4DEC-4153-B5B4-AA5A73DA8EAE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE43279D-728C-457D-99D2-9FE0F1AE89EE",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B883DD17-1FAB-463A-A697-595F47C17629",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5d_mark_iii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC81188A-A334-4BE4-8382-91ADC6678473",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5d_mark_iii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "489E40A9-5999-47AA-A527-C54E509C724B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5d_mark_iv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "060396F2-96C0-4058-B671-85B9FBEB007B",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5d_mark_iv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F8DEB8B-9CC8-4E67-B059-3556720BF83B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5ds_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A545F7D1-97BA-495B-BE15-7F1DB1DD5BEC",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5ds:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52F07C57-B580-4590-A8AB-7717052BDEFA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5ds_r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81092A79-2651-4E01-A5C1-FF1B79EC99AE",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5ds_r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE5DF31C-6D16-4BEE-968F-549786AEDD95",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_6d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "49FB54E4-B118-4DE6-93CE-BA703E0341DE",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.8",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_6d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FFA6C61-D190-460D-A7E0-EDC50DC6A47B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_7d_mark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C287C13F-2188-42E3-873A-3F8BF002FB9E",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_7d_mark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29EB7B3D-1BC5-44D7-9691-6161C9D0F637",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_70d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB2F1134-917A-430A-BB11-99D822045D0E",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_70d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9949BC8A-BA70-48F3-AEBD-9A3EE0B00E6B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_80d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75FBB900-929A-43DA-8DFA-8709D0CDCD2C",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_80d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78791BA-1FC4-423B-A51A-79201B3D835C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x7i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94517FFB-1A37-4921-8379-41A640BCB773",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x7i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3301D22-8BDC-4C8A-B4CD-6CF338DB8534",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16655C13-8EED-4F50-8D5E-A2E1DD45CC53",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04CD4A54-856A-4E97-AD00-EE662FD79F51",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_700d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BAA428E-E2DB-40B6-94B1-5DFFAE8445D9",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_700d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2986DD7-AEDB-416B-BF6E-E1A65AFB3D22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x8i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "313420F0-2076-416F-AE26-D81501D5D96A",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x8i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF28AD1-CF83-41FD-AF90-D9E58EB13AB0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "550C3683-14BA-4CE0-A518-8B748B179104",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D63EFD4-D98F-4066-A04E-C8332FDC88CB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_750d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE92DE01-9587-4B49-A30D-1ACFA21A1237",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_750d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1711827E-E6DC-4AEA-BB38-FE836C75F97D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x9i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4F7E5D8-0FE9-4B67-B6A4-F45B47429384",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x9i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9045D5D-84CB-4C89-BBEC-9DF4DF99C1EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t7i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AECEE371-A8BD-420E-B758-244CAD9037BB",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t7i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E977062-3B82-4FC5-9289-808C2144D94E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_800d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "881A3902-43E7-418C-A2A0-D25C2EDCD011",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_800d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B1D3708-29DC-4153-9D7C-D21D1CCC8DAF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDEC1E1-69BF-4551-96FF-BC9AB9D9BB9B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DAD909A-A037-497E-B07F-914CB64E6A9F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D8A4070-548E-4425-A46F-2EE6BB65B119",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3EAADDF-F7AB-4C66-A2B9-40AC7452D372",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_100d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "466391FD-1F08-4DA0-8404-C041599C1366",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_100d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28B213ED-9472-4E3A-9E05-70AB24207966",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x9_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BB22EC-5BC8-45FB-8E52-086812BC1546",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6B9C1F-974B-44E4-9BA1-6D31089E13EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "726F2082-AB0E-4E37-96AD-80B4237B438B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CE3620C-45D8-4A91-9350-9CC2B30D3796",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F06FEE37-9060-4B79-A24E-BACBC19E0FDF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C9F004-59CC-47A7-B308-C918DA1C3103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F876428-9FB9-4C50-8873-CCEA75AFB426",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3D0A03-8ABE-4EB3-AAAD-1E1DA29C14BD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9BF9B43-803C-45EC-8B45-22C6CCE1CC3B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20AD1E6B-B9A2-493E-B075-5D18F2E8E53F",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C9F004-59CC-47A7-B308-C918DA1C3103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F06FEE37-9060-4B79-A24E-BACBC19E0FDF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_250d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B81633B6-8CE2-4D83-92E3-634756127620",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_250d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57693A68-0B3E-4DE5-B563-DA124199EDF3",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_8000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B301D4DB-1EF8-4162-83EB-66B533052047",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_8000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0C89004-64CF-4B49-9D69-313A2D56F339",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF0A7AA-A115-4110-8E72-746C00CC4033",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF427FA-1455-4CDF-8E69-E5A3543E5728",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_760d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A40C05-C50F-4D73-B640-782B07DFE9AB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_760d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57B53943-4AEB-4AD9-8E34-AF64B96A6D68",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_9000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3802327-3156-45A7-827D-C94CD68AC389",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_9000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D2A3393-3DB9-4B83-9F32-4FAD1C66D35D",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_77d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11C783F5-81D9-4C9D-8D24-DBB0BBA6DEAC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_77d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A6FAAC-1362-496F-9567-C168E90B29B7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x70_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EA6C79B-E124-4CB9-ACA9-85F939B1701B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x70:-:*:*:*:*:*:*:*",
"matchCriteriaId": "133D14D9-4A81-4FE4-96E4-15E741903C84",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7957441E-8476-4E0A-8E12-1D6ABBBD0B4E",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39E9A117-A0F6-4C79-9D66-2EED88883010",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E5064C5-51C1-412C-8145-8561C3592D8B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F141B5D-70AD-41ED-BEA0-A880A6B415AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5_re_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79296E01-0977-4A46-B54E-38E08FC640F9",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5_re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0165438-12A3-40E4-9FB0-B57EC1CAB6CA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1200d_mg_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "022D3E5E-1109-44C7-AB63-489C11AE89FE",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1200d_mg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30073057-8B4F-4A85-A062-DABFE3816821",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_hi_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1CB6DE0-E9E3-47E1-9DD6-217F00F911C9",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_hi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B37853E-DA5B-468A-9E2A-B7DA45F5338E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x80_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0292A9A-81D2-4834-BB56-03D4D1F70E8F",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x80:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53F32AEE-9C79-4449-89F9-36ACF5ACCAAF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "032CEA19-3687-4687-BBE3-6E42C816DA09",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB28EBA9-8BC9-48FF-A858-69D866FBEE63",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1300d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C23F53-7875-466D-8750-154FDF85B4B5",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1300d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62C62C20-695C-4E7E-A0DE-D205131B7406",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x90_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2AE5E5B6-8A75-4FC0-B161-2BEC0A36B359",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x90:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9E4CED-A511-498F-AB15-FDDB2BC5DE0C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3CA9BF4-6A9B-4E17-999F-F6F738699116",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8ACA7F44-9F78-40CE-BDA7-96013B3BD137",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1500d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD5DCC6-06C0-43ED-8CC7-D8C0F5E2134F",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1500d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F289482-2B2A-40A3-B473-268B38E4864F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_2000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D2B3E84-00C6-4371-8A41-459B49D63606",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_2000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D36E69CD-A095-4D3E-A86F-9F0AA0FA6F91",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E792C6AE-52B7-4075-9FB3-A54C027FD351",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC96B6D1-6EF5-4483-A27B-E3D91A803420",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_3000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23C1956F-B3F7-47D7-B85D-408F78283623",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_3000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F93BF881-57E7-4EC2-99B6-6D0454A3B67A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_4000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D87306A6-AF3F-4B90-9C47-4A61E25F273C",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_4000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54316C9A-0BF3-43EF-AF01-97E453E08B84",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE65951A-B6AC-4719-BD29-B6D6B02CDBDE",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B5B8A44-8511-41E9-8AD1-B44F2524FD8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_rp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07864E4A-DFC2-4F94-86FE-F64C5825DC70",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_rp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85C1EC49-5691-42A0-AD48-7612674F95C2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_rp_gold_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF3923BA-A7B1-4167-AE79-7632C443C2BE",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_rp_gold:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F36D91E0-13C1-4465-9B7E-9F465F53AEC8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F62AD1C8-6487-4B84-8879-5262801051F1",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.3",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE706B6-F706-45BB-95E5-7CBA3C186BA9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEA9741C-B1B7-4552-8952-BD9D7B00DF58",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0E26818-C97C-4551-A06A-41FD51202FC7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F020BDB5-7012-4DEB-A60F-B65492F4C7CF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D09A072-28A0-4E1B-9627-EC23166DE09E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m6_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6120F799-2FF3-4DFF-91EF-80B345F96111",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C2D504-1CE1-45D2-B09F-48D89D7C4587",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m6\\(china\\)_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4382BB-51E7-486C-AFBC-2B559905DFBC",
"versionEndExcluding": null,
"versionEndIncluding": "5.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m6\\(china\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "DED4A602-417C-47C6-B78F-5C1D14AF0A33",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9CC311-58D9-450F-B204-C9215A604358",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1A1144-77DA-4BF9-84F4-273BFEB3C626",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E99864D-6BA3-4136-87AA-7FE2C5462F94",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "082679E2-82A8-4501-9866-B3335CE2090F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_m_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3927F40-B5E5-4076-8990-0FB44853D6AC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF443D78-4C04-4276-BA8E-BE2ADC368287",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15728BA0-702E-4A87-B20F-00B79D938A75",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D929C30A-59C4-43F0-B928-941454D9F6D2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_sx740_hs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50564BC7-F034-4B96-9590-34A1714A61E8",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_sx740_hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "396924EF-075F-48D5-80FF-723A4418F1DD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_sx70_hs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "412BF37C-129C-46DB-87B6-AF0DFF6D6EEA",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_sx70_hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8EA82F6-BC50-4F75-AB50-F0DAECFA8CCC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_g5xmark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A7465D6-F425-4B46-91B8-2A3FCEF0B0FC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_g5xmark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC2077A-2038-4C4B-82AC-D55B24C37D41",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_6d_mark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37D03B7E-31D1-4DAB-8AB5-A6119E5B9C70",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.4",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_6d_mark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29A0F9B9-4660-4B49-BE56-1BECA639215F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | 10,411 |
CVE-2019-5999 | 2019-08-06T19:15:14.363 | Buffer overflow in PTP (Picture Transfer Protocol) of EOS series digital cameras (EOS-1D X firmware version 2.1.0 and earlier, EOS-1D X MKII firmware version 1.1.6 and earlier, EOS-1D C firmware version 1.4.1 and earlier, EOS 5D MARK III firmware version 1.3.5 and earlier, EOS 5D MARK IV firmware version 1.2.0 and earlier, EOS 5DS firmware version 1.1.2 and earlier, EOS 5DS R firmware version 1.1.2 and earlier, EOS 6D firmware version 1.1.8 and earlier, EOS 6D MARK II firmware version 1.0.4 and earlier, EOS 7D MARK II firmware version 1.1.2 and earlier, EOS 70 D firmware version 1.1.2 and earlier, EOS 80 D firmware version 1.0.2 and earlier, EOS KISS X7I / EOS D REBEL T5I / EOS 700D firmware version 1.1.5 and earlier, EOS KISS X8I / EOS D REBEL T6I / EOS 750D firmware version 1.0.0 and earlier, EOS KISS X9I / EOS D REBEL T7I / EOS 800D firmware version 1.0.1 and earlier, EOS KISS X7 / EOS D REBEL SL1 / EOS 100D firmware version 1.0.1 and earlier, EOS KISS X9 / EOS D REBEL SL2 / EOS 200D firmware version 1.0.1 and earlier, EOS KISS X10 / EOS D REBEL SL3 / EOS 200D / EOS 250D firmware version 1.0.1 and earlier, EOS 8000D / EOS D REBEL T6S / EOS 760D firmware version 1.0.0 and earlier, EOS 9000D / EOS 77D firmware version 1.0.2 and earlier, EOS KISS X70 / EOS D REBEL T5 / EOS 1200D firmware version 1.0.2 and earlier, EOS D REBEL T5 RE / EOS 1200D MG / EOS HI firmware version 1.0.2 and earlier, EOS KISS X80 / EOS D REBEL T6 / EOS 1300D firmware version 1.1.0 and earlier, EOS KISS X90 / EOS D REBEL T7 / EOS 1500D / EOS 2000D firmware version 1.0.0 and earlier, EOS D REBEL T100 / EOS 3000D / EOS 4000D firmware version 1.0.0 and earlier, EOS R firmware version 1.3.0 and earlier, EOS RP firmware version 1.2.0 and earlier, EOS RP GOLD firmware version 1.2.0 and earlier, EOS M2 firmware version 1.0.3 and earlier, EOS M3 firmware version 1.2.0 and earlier, EOS M5 firmware version 1.0.1 and earlier, EOS M6 firmware version 1.0.1 and earlier, EOS M6(China) firmware version 5.0.0 and earlier, EOS M10 firmware version 1.1.0 and earlier, EOS M100 firmware version 1.0.0 and earlier, EOS KISS M / EOS M50 firmware version 1.0.2 and earlier) and PowerShot SX740 HS firmware version 1.0.1 and earlier, PowerShot SX70 HS firmware version 1.1.0 and earlier, and PowerShot G5Xmark II firmware version 1.0.1 and earlier allows an attacker on the same network segment to trigger the affected product being unresponsive or to execute arbitrary code on the affected product via blerequest command. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/vu/JVNVU97511331/index.html"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://cweb.canon.jp/e-support/products/eos-d/190806dilc-firm.html"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.canon-europe.com/support/product-security/"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.usa.canon.com/internet/portal/us/home/support/product-advisories/detail/the-vulnerability-in-canon-digital-cameras"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B41EAE-6CFC-4142-947F-9570416B8430",
"versionEndExcluding": null,
"versionEndIncluding": "2.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D900D931-52FA-4A7C-B1F0-4ED7FF16B590",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_x_mkii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "115C8AE1-7F4E-4F4C-B6E0-8BACCB058E0F",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.6",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_x_mkii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A01C7E96-4DEC-4153-B5B4-AA5A73DA8EAE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE43279D-728C-457D-99D2-9FE0F1AE89EE",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B883DD17-1FAB-463A-A697-595F47C17629",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5d_mark_iii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC81188A-A334-4BE4-8382-91ADC6678473",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5d_mark_iii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "489E40A9-5999-47AA-A527-C54E509C724B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5d_mark_iv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "060396F2-96C0-4058-B671-85B9FBEB007B",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5d_mark_iv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F8DEB8B-9CC8-4E67-B059-3556720BF83B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5ds_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A545F7D1-97BA-495B-BE15-7F1DB1DD5BEC",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5ds:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52F07C57-B580-4590-A8AB-7717052BDEFA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5ds_r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81092A79-2651-4E01-A5C1-FF1B79EC99AE",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5ds_r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE5DF31C-6D16-4BEE-968F-549786AEDD95",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_6d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "49FB54E4-B118-4DE6-93CE-BA703E0341DE",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.8",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_6d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FFA6C61-D190-460D-A7E0-EDC50DC6A47B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_7d_mark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C287C13F-2188-42E3-873A-3F8BF002FB9E",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_7d_mark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29EB7B3D-1BC5-44D7-9691-6161C9D0F637",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_70d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB2F1134-917A-430A-BB11-99D822045D0E",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_70d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9949BC8A-BA70-48F3-AEBD-9A3EE0B00E6B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_80d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75FBB900-929A-43DA-8DFA-8709D0CDCD2C",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_80d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78791BA-1FC4-423B-A51A-79201B3D835C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x7i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94517FFB-1A37-4921-8379-41A640BCB773",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x7i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3301D22-8BDC-4C8A-B4CD-6CF338DB8534",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16655C13-8EED-4F50-8D5E-A2E1DD45CC53",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04CD4A54-856A-4E97-AD00-EE662FD79F51",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_700d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BAA428E-E2DB-40B6-94B1-5DFFAE8445D9",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_700d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2986DD7-AEDB-416B-BF6E-E1A65AFB3D22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x8i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "313420F0-2076-416F-AE26-D81501D5D96A",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x8i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF28AD1-CF83-41FD-AF90-D9E58EB13AB0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "550C3683-14BA-4CE0-A518-8B748B179104",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D63EFD4-D98F-4066-A04E-C8332FDC88CB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_750d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE92DE01-9587-4B49-A30D-1ACFA21A1237",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_750d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1711827E-E6DC-4AEA-BB38-FE836C75F97D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x9i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4F7E5D8-0FE9-4B67-B6A4-F45B47429384",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x9i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9045D5D-84CB-4C89-BBEC-9DF4DF99C1EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t7i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AECEE371-A8BD-420E-B758-244CAD9037BB",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t7i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E977062-3B82-4FC5-9289-808C2144D94E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_800d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "881A3902-43E7-418C-A2A0-D25C2EDCD011",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_800d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B1D3708-29DC-4153-9D7C-D21D1CCC8DAF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDEC1E1-69BF-4551-96FF-BC9AB9D9BB9B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DAD909A-A037-497E-B07F-914CB64E6A9F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D8A4070-548E-4425-A46F-2EE6BB65B119",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3EAADDF-F7AB-4C66-A2B9-40AC7452D372",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_100d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "466391FD-1F08-4DA0-8404-C041599C1366",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_100d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28B213ED-9472-4E3A-9E05-70AB24207966",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x9_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BB22EC-5BC8-45FB-8E52-086812BC1546",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6B9C1F-974B-44E4-9BA1-6D31089E13EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "726F2082-AB0E-4E37-96AD-80B4237B438B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CE3620C-45D8-4A91-9350-9CC2B30D3796",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F06FEE37-9060-4B79-A24E-BACBC19E0FDF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C9F004-59CC-47A7-B308-C918DA1C3103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F876428-9FB9-4C50-8873-CCEA75AFB426",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3D0A03-8ABE-4EB3-AAAD-1E1DA29C14BD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20AD1E6B-B9A2-493E-B075-5D18F2E8E53F",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9BF9B43-803C-45EC-8B45-22C6CCE1CC3B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F06FEE37-9060-4B79-A24E-BACBC19E0FDF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C9F004-59CC-47A7-B308-C918DA1C3103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_250d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57693A68-0B3E-4DE5-B563-DA124199EDF3",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_250d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B81633B6-8CE2-4D83-92E3-634756127620",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_8000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0C89004-64CF-4B49-9D69-313A2D56F339",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_8000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B301D4DB-1EF8-4162-83EB-66B533052047",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF427FA-1455-4CDF-8E69-E5A3543E5728",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF0A7AA-A115-4110-8E72-746C00CC4033",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_760d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57B53943-4AEB-4AD9-8E34-AF64B96A6D68",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_760d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A40C05-C50F-4D73-B640-782B07DFE9AB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_9000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D2A3393-3DB9-4B83-9F32-4FAD1C66D35D",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_9000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3802327-3156-45A7-827D-C94CD68AC389",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_77d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11C783F5-81D9-4C9D-8D24-DBB0BBA6DEAC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_77d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A6FAAC-1362-496F-9567-C168E90B29B7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x70_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EA6C79B-E124-4CB9-ACA9-85F939B1701B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x70:-:*:*:*:*:*:*:*",
"matchCriteriaId": "133D14D9-4A81-4FE4-96E4-15E741903C84",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7957441E-8476-4E0A-8E12-1D6ABBBD0B4E",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39E9A117-A0F6-4C79-9D66-2EED88883010",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E5064C5-51C1-412C-8145-8561C3592D8B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F141B5D-70AD-41ED-BEA0-A880A6B415AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5_re_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79296E01-0977-4A46-B54E-38E08FC640F9",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5_re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0165438-12A3-40E4-9FB0-B57EC1CAB6CA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1200d_mg_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "022D3E5E-1109-44C7-AB63-489C11AE89FE",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1200d_mg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30073057-8B4F-4A85-A062-DABFE3816821",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_hi_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1CB6DE0-E9E3-47E1-9DD6-217F00F911C9",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_hi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B37853E-DA5B-468A-9E2A-B7DA45F5338E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x80_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0292A9A-81D2-4834-BB56-03D4D1F70E8F",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x80:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53F32AEE-9C79-4449-89F9-36ACF5ACCAAF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "032CEA19-3687-4687-BBE3-6E42C816DA09",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB28EBA9-8BC9-48FF-A858-69D866FBEE63",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1300d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C23F53-7875-466D-8750-154FDF85B4B5",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1300d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62C62C20-695C-4E7E-A0DE-D205131B7406",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x90_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2AE5E5B6-8A75-4FC0-B161-2BEC0A36B359",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x90:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9E4CED-A511-498F-AB15-FDDB2BC5DE0C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3CA9BF4-6A9B-4E17-999F-F6F738699116",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8ACA7F44-9F78-40CE-BDA7-96013B3BD137",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1500d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD5DCC6-06C0-43ED-8CC7-D8C0F5E2134F",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1500d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F289482-2B2A-40A3-B473-268B38E4864F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_2000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D2B3E84-00C6-4371-8A41-459B49D63606",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_2000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D36E69CD-A095-4D3E-A86F-9F0AA0FA6F91",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E792C6AE-52B7-4075-9FB3-A54C027FD351",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC96B6D1-6EF5-4483-A27B-E3D91A803420",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_3000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23C1956F-B3F7-47D7-B85D-408F78283623",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_3000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F93BF881-57E7-4EC2-99B6-6D0454A3B67A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_4000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D87306A6-AF3F-4B90-9C47-4A61E25F273C",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_4000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54316C9A-0BF3-43EF-AF01-97E453E08B84",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE65951A-B6AC-4719-BD29-B6D6B02CDBDE",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B5B8A44-8511-41E9-8AD1-B44F2524FD8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_rp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07864E4A-DFC2-4F94-86FE-F64C5825DC70",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_rp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85C1EC49-5691-42A0-AD48-7612674F95C2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_rp_gold_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF3923BA-A7B1-4167-AE79-7632C443C2BE",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_rp_gold:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F36D91E0-13C1-4465-9B7E-9F465F53AEC8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F62AD1C8-6487-4B84-8879-5262801051F1",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.3",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE706B6-F706-45BB-95E5-7CBA3C186BA9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEA9741C-B1B7-4552-8952-BD9D7B00DF58",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0E26818-C97C-4551-A06A-41FD51202FC7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F020BDB5-7012-4DEB-A60F-B65492F4C7CF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D09A072-28A0-4E1B-9627-EC23166DE09E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m6_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6120F799-2FF3-4DFF-91EF-80B345F96111",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C2D504-1CE1-45D2-B09F-48D89D7C4587",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m6\\(china\\)_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4382BB-51E7-486C-AFBC-2B559905DFBC",
"versionEndExcluding": null,
"versionEndIncluding": "5.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m6\\(china\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "DED4A602-417C-47C6-B78F-5C1D14AF0A33",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9CC311-58D9-450F-B204-C9215A604358",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1A1144-77DA-4BF9-84F4-273BFEB3C626",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E99864D-6BA3-4136-87AA-7FE2C5462F94",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "082679E2-82A8-4501-9866-B3335CE2090F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_m_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3927F40-B5E5-4076-8990-0FB44853D6AC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF443D78-4C04-4276-BA8E-BE2ADC368287",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15728BA0-702E-4A87-B20F-00B79D938A75",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D929C30A-59C4-43F0-B928-941454D9F6D2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_sx740_hs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50564BC7-F034-4B96-9590-34A1714A61E8",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_sx740_hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "396924EF-075F-48D5-80FF-723A4418F1DD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_sx70_hs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "412BF37C-129C-46DB-87B6-AF0DFF6D6EEA",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_sx70_hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8EA82F6-BC50-4F75-AB50-F0DAECFA8CCC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_g5xmark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A7465D6-F425-4B46-91B8-2A3FCEF0B0FC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_g5xmark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC2077A-2038-4C4B-82AC-D55B24C37D41",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_6d_mark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37D03B7E-31D1-4DAB-8AB5-A6119E5B9C70",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.4",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_6d_mark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29A0F9B9-4660-4B49-BE56-1BECA639215F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | 10,412 |
CVE-2019-6000 | 2019-08-06T19:15:14.443 | Buffer overflow in PTP (Picture Transfer Protocol) of EOS series digital cameras (EOS-1D X firmware version 2.1.0 and earlier, EOS-1D X MKII firmware version 1.1.6 and earlier, EOS-1D C firmware version 1.4.1 and earlier, EOS 5D MARK III firmware version 1.3.5 and earlier, EOS 5D MARK IV firmware version 1.2.0 and earlier, EOS 5DS firmware version 1.1.2 and earlier, EOS 5DS R firmware version 1.1.2 and earlier, EOS 6D firmware version 1.1.8 and earlier, EOS 6D MARK II firmware version 1.0.4 and earlier, EOS 7D MARK II firmware version 1.1.2 and earlier, EOS 70 D firmware version 1.1.2 and earlier, EOS 80 D firmware version 1.0.2 and earlier, EOS KISS X7I / EOS D REBEL T5I / EOS 700D firmware version 1.1.5 and earlier, EOS KISS X8I / EOS D REBEL T6I / EOS 750D firmware version 1.0.0 and earlier, EOS KISS X9I / EOS D REBEL T7I / EOS 800D firmware version 1.0.1 and earlier, EOS KISS X7 / EOS D REBEL SL1 / EOS 100D firmware version 1.0.1 and earlier, EOS KISS X9 / EOS D REBEL SL2 / EOS 200D firmware version 1.0.1 and earlier, EOS KISS X10 / EOS D REBEL SL3 / EOS 200D / EOS 250D firmware version 1.0.1 and earlier, EOS 8000D / EOS D REBEL T6S / EOS 760D firmware version 1.0.0 and earlier, EOS 9000D / EOS 77D firmware version 1.0.2 and earlier, EOS KISS X70 / EOS D REBEL T5 / EOS 1200D firmware version 1.0.2 and earlier, EOS D REBEL T5 RE / EOS 1200D MG / EOS HI firmware version 1.0.2 and earlier, EOS KISS X80 / EOS D REBEL T6 / EOS 1300D firmware version 1.1.0 and earlier, EOS KISS X90 / EOS D REBEL T7 / EOS 1500D / EOS 2000D firmware version 1.0.0 and earlier, EOS D REBEL T100 / EOS 3000D / EOS 4000D firmware version 1.0.0 and earlier, EOS R firmware version 1.3.0 and earlier, EOS RP firmware version 1.2.0 and earlier, EOS RP GOLD firmware version 1.2.0 and earlier, EOS M2 firmware version 1.0.3 and earlier, EOS M3 firmware version 1.2.0 and earlier, EOS M5 firmware version 1.0.1 and earlier, EOS M6 firmware version 1.0.1 and earlier, EOS M6(China) firmware version 5.0.0 and earlier, EOS M10 firmware version 1.1.0 and earlier, EOS M100 firmware version 1.0.0 and earlier, EOS KISS M / EOS M50 firmware version 1.0.2 and earlier) and PowerShot SX740 HS firmware version 1.0.1 and earlier, PowerShot SX70 HS firmware version 1.1.0 and earlier, and PowerShot G5Xmark II firmware version 1.0.1 and earlier allows an attacker on the same network segment to trigger the affected product being unresponsive or to execute arbitrary code on the affected product via sendhostinfo command. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/vu/JVNVU97511331/index.html"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://cweb.canon.jp/e-support/products/eos-d/190806dilc-firm.html"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.canon-europe.com/support/product-security/"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.usa.canon.com/internet/portal/us/home/support/product-advisories/detail/the-vulnerability-in-canon-digital-cameras"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B41EAE-6CFC-4142-947F-9570416B8430",
"versionEndExcluding": null,
"versionEndIncluding": "2.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D900D931-52FA-4A7C-B1F0-4ED7FF16B590",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_x_mkii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "115C8AE1-7F4E-4F4C-B6E0-8BACCB058E0F",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.6",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_x_mkii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A01C7E96-4DEC-4153-B5B4-AA5A73DA8EAE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE43279D-728C-457D-99D2-9FE0F1AE89EE",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B883DD17-1FAB-463A-A697-595F47C17629",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5d_mark_iii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC81188A-A334-4BE4-8382-91ADC6678473",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5d_mark_iii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "489E40A9-5999-47AA-A527-C54E509C724B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5d_mark_iv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "060396F2-96C0-4058-B671-85B9FBEB007B",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5d_mark_iv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F8DEB8B-9CC8-4E67-B059-3556720BF83B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5ds_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A545F7D1-97BA-495B-BE15-7F1DB1DD5BEC",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5ds:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52F07C57-B580-4590-A8AB-7717052BDEFA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5ds_r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81092A79-2651-4E01-A5C1-FF1B79EC99AE",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5ds_r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE5DF31C-6D16-4BEE-968F-549786AEDD95",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_6d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "49FB54E4-B118-4DE6-93CE-BA703E0341DE",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.8",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_6d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FFA6C61-D190-460D-A7E0-EDC50DC6A47B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_7d_mark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C287C13F-2188-42E3-873A-3F8BF002FB9E",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_7d_mark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29EB7B3D-1BC5-44D7-9691-6161C9D0F637",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_70d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB2F1134-917A-430A-BB11-99D822045D0E",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_70d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9949BC8A-BA70-48F3-AEBD-9A3EE0B00E6B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_80d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75FBB900-929A-43DA-8DFA-8709D0CDCD2C",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_80d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78791BA-1FC4-423B-A51A-79201B3D835C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x7i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94517FFB-1A37-4921-8379-41A640BCB773",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x7i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3301D22-8BDC-4C8A-B4CD-6CF338DB8534",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16655C13-8EED-4F50-8D5E-A2E1DD45CC53",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04CD4A54-856A-4E97-AD00-EE662FD79F51",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_700d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BAA428E-E2DB-40B6-94B1-5DFFAE8445D9",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_700d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2986DD7-AEDB-416B-BF6E-E1A65AFB3D22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x8i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "313420F0-2076-416F-AE26-D81501D5D96A",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x8i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF28AD1-CF83-41FD-AF90-D9E58EB13AB0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "550C3683-14BA-4CE0-A518-8B748B179104",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D63EFD4-D98F-4066-A04E-C8332FDC88CB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_750d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE92DE01-9587-4B49-A30D-1ACFA21A1237",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_750d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1711827E-E6DC-4AEA-BB38-FE836C75F97D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x9i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4F7E5D8-0FE9-4B67-B6A4-F45B47429384",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x9i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9045D5D-84CB-4C89-BBEC-9DF4DF99C1EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t7i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AECEE371-A8BD-420E-B758-244CAD9037BB",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t7i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E977062-3B82-4FC5-9289-808C2144D94E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_800d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "881A3902-43E7-418C-A2A0-D25C2EDCD011",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_800d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B1D3708-29DC-4153-9D7C-D21D1CCC8DAF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDEC1E1-69BF-4551-96FF-BC9AB9D9BB9B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DAD909A-A037-497E-B07F-914CB64E6A9F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D8A4070-548E-4425-A46F-2EE6BB65B119",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3EAADDF-F7AB-4C66-A2B9-40AC7452D372",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_100d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "466391FD-1F08-4DA0-8404-C041599C1366",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_100d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28B213ED-9472-4E3A-9E05-70AB24207966",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x9_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BB22EC-5BC8-45FB-8E52-086812BC1546",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6B9C1F-974B-44E4-9BA1-6D31089E13EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "726F2082-AB0E-4E37-96AD-80B4237B438B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CE3620C-45D8-4A91-9350-9CC2B30D3796",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F06FEE37-9060-4B79-A24E-BACBC19E0FDF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C9F004-59CC-47A7-B308-C918DA1C3103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F876428-9FB9-4C50-8873-CCEA75AFB426",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3D0A03-8ABE-4EB3-AAAD-1E1DA29C14BD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20AD1E6B-B9A2-493E-B075-5D18F2E8E53F",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9BF9B43-803C-45EC-8B45-22C6CCE1CC3B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F06FEE37-9060-4B79-A24E-BACBC19E0FDF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C9F004-59CC-47A7-B308-C918DA1C3103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_250d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57693A68-0B3E-4DE5-B563-DA124199EDF3",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_250d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B81633B6-8CE2-4D83-92E3-634756127620",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_8000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0C89004-64CF-4B49-9D69-313A2D56F339",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_8000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B301D4DB-1EF8-4162-83EB-66B533052047",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF427FA-1455-4CDF-8E69-E5A3543E5728",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF0A7AA-A115-4110-8E72-746C00CC4033",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_760d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57B53943-4AEB-4AD9-8E34-AF64B96A6D68",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_760d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A40C05-C50F-4D73-B640-782B07DFE9AB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_9000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D2A3393-3DB9-4B83-9F32-4FAD1C66D35D",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_9000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3802327-3156-45A7-827D-C94CD68AC389",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_77d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11C783F5-81D9-4C9D-8D24-DBB0BBA6DEAC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_77d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A6FAAC-1362-496F-9567-C168E90B29B7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x70_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EA6C79B-E124-4CB9-ACA9-85F939B1701B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x70:-:*:*:*:*:*:*:*",
"matchCriteriaId": "133D14D9-4A81-4FE4-96E4-15E741903C84",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7957441E-8476-4E0A-8E12-1D6ABBBD0B4E",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39E9A117-A0F6-4C79-9D66-2EED88883010",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E5064C5-51C1-412C-8145-8561C3592D8B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F141B5D-70AD-41ED-BEA0-A880A6B415AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5_re_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79296E01-0977-4A46-B54E-38E08FC640F9",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5_re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0165438-12A3-40E4-9FB0-B57EC1CAB6CA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1200d_mg_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "022D3E5E-1109-44C7-AB63-489C11AE89FE",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1200d_mg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30073057-8B4F-4A85-A062-DABFE3816821",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_hi_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1CB6DE0-E9E3-47E1-9DD6-217F00F911C9",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_hi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B37853E-DA5B-468A-9E2A-B7DA45F5338E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x80_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0292A9A-81D2-4834-BB56-03D4D1F70E8F",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x80:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53F32AEE-9C79-4449-89F9-36ACF5ACCAAF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "032CEA19-3687-4687-BBE3-6E42C816DA09",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB28EBA9-8BC9-48FF-A858-69D866FBEE63",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1300d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C23F53-7875-466D-8750-154FDF85B4B5",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1300d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62C62C20-695C-4E7E-A0DE-D205131B7406",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x90_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2AE5E5B6-8A75-4FC0-B161-2BEC0A36B359",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x90:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9E4CED-A511-498F-AB15-FDDB2BC5DE0C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3CA9BF4-6A9B-4E17-999F-F6F738699116",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8ACA7F44-9F78-40CE-BDA7-96013B3BD137",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1500d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD5DCC6-06C0-43ED-8CC7-D8C0F5E2134F",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1500d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F289482-2B2A-40A3-B473-268B38E4864F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_2000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D2B3E84-00C6-4371-8A41-459B49D63606",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_2000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D36E69CD-A095-4D3E-A86F-9F0AA0FA6F91",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E792C6AE-52B7-4075-9FB3-A54C027FD351",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC96B6D1-6EF5-4483-A27B-E3D91A803420",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_3000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23C1956F-B3F7-47D7-B85D-408F78283623",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_3000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F93BF881-57E7-4EC2-99B6-6D0454A3B67A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_4000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D87306A6-AF3F-4B90-9C47-4A61E25F273C",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_4000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54316C9A-0BF3-43EF-AF01-97E453E08B84",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE65951A-B6AC-4719-BD29-B6D6B02CDBDE",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B5B8A44-8511-41E9-8AD1-B44F2524FD8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_rp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07864E4A-DFC2-4F94-86FE-F64C5825DC70",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_rp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85C1EC49-5691-42A0-AD48-7612674F95C2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_rp_gold_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF3923BA-A7B1-4167-AE79-7632C443C2BE",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_rp_gold:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F36D91E0-13C1-4465-9B7E-9F465F53AEC8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F62AD1C8-6487-4B84-8879-5262801051F1",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.3",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE706B6-F706-45BB-95E5-7CBA3C186BA9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEA9741C-B1B7-4552-8952-BD9D7B00DF58",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0E26818-C97C-4551-A06A-41FD51202FC7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F020BDB5-7012-4DEB-A60F-B65492F4C7CF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D09A072-28A0-4E1B-9627-EC23166DE09E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m6_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6120F799-2FF3-4DFF-91EF-80B345F96111",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C2D504-1CE1-45D2-B09F-48D89D7C4587",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m6\\(china\\)_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4382BB-51E7-486C-AFBC-2B559905DFBC",
"versionEndExcluding": null,
"versionEndIncluding": "5.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m6\\(china\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "DED4A602-417C-47C6-B78F-5C1D14AF0A33",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9CC311-58D9-450F-B204-C9215A604358",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1A1144-77DA-4BF9-84F4-273BFEB3C626",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E99864D-6BA3-4136-87AA-7FE2C5462F94",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "082679E2-82A8-4501-9866-B3335CE2090F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_m_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3927F40-B5E5-4076-8990-0FB44853D6AC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF443D78-4C04-4276-BA8E-BE2ADC368287",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15728BA0-702E-4A87-B20F-00B79D938A75",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D929C30A-59C4-43F0-B928-941454D9F6D2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_sx740_hs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50564BC7-F034-4B96-9590-34A1714A61E8",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_sx740_hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "396924EF-075F-48D5-80FF-723A4418F1DD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_sx70_hs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "412BF37C-129C-46DB-87B6-AF0DFF6D6EEA",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_sx70_hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8EA82F6-BC50-4F75-AB50-F0DAECFA8CCC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_g5xmark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A7465D6-F425-4B46-91B8-2A3FCEF0B0FC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_g5xmark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC2077A-2038-4C4B-82AC-D55B24C37D41",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_6d_mark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37D03B7E-31D1-4DAB-8AB5-A6119E5B9C70",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.4",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_6d_mark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29A0F9B9-4660-4B49-BE56-1BECA639215F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | 10,413 |
CVE-2019-6001 | 2019-08-06T19:15:14.537 | Buffer overflow in PTP (Picture Transfer Protocol) of EOS series digital cameras (EOS-1D X firmware version 2.1.0 and earlier, EOS-1D X MKII firmware version 1.1.6 and earlier, EOS-1D C firmware version 1.4.1 and earlier, EOS 5D MARK III firmware version 1.3.5 and earlier, EOS 5D MARK IV firmware version 1.2.0 and earlier, EOS 5DS firmware version 1.1.2 and earlier, EOS 5DS R firmware version 1.1.2 and earlier, EOS 6D firmware version 1.1.8 and earlier, EOS 6D MARK II firmware version 1.0.4 and earlier, EOS 7D MARK II firmware version 1.1.2 and earlier, EOS 70 D firmware version 1.1.2 and earlier, EOS 80 D firmware version 1.0.2 and earlier, EOS KISS X7I / EOS D REBEL T5I / EOS 700D firmware version 1.1.5 and earlier, EOS KISS X8I / EOS D REBEL T6I / EOS 750D firmware version 1.0.0 and earlier, EOS KISS X9I / EOS D REBEL T7I / EOS 800D firmware version 1.0.1 and earlier, EOS KISS X7 / EOS D REBEL SL1 / EOS 100D firmware version 1.0.1 and earlier, EOS KISS X9 / EOS D REBEL SL2 / EOS 200D firmware version 1.0.1 and earlier, EOS KISS X10 / EOS D REBEL SL3 / EOS 200D / EOS 250D firmware version 1.0.1 and earlier, EOS 8000D / EOS D REBEL T6S / EOS 760D firmware version 1.0.0 and earlier, EOS 9000D / EOS 77D firmware version 1.0.2 and earlier, EOS KISS X70 / EOS D REBEL T5 / EOS 1200D firmware version 1.0.2 and earlier, EOS D REBEL T5 RE / EOS 1200D MG / EOS HI firmware version 1.0.2 and earlier, EOS KISS X80 / EOS D REBEL T6 / EOS 1300D firmware version 1.1.0 and earlier, EOS KISS X90 / EOS D REBEL T7 / EOS 1500D / EOS 2000D firmware version 1.0.0 and earlier, EOS D REBEL T100 / EOS 3000D / EOS 4000D firmware version 1.0.0 and earlier, EOS R firmware version 1.3.0 and earlier, EOS RP firmware version 1.2.0 and earlier, EOS RP GOLD firmware version 1.2.0 and earlier, EOS M2 firmware version 1.0.3 and earlier, EOS M3 firmware version 1.2.0 and earlier, EOS M5 firmware version 1.0.1 and earlier, EOS M6 firmware version 1.0.1 and earlier, EOS M6(China) firmware version 5.0.0 and earlier, EOS M10 firmware version 1.1.0 and earlier, EOS M100 firmware version 1.0.0 and earlier, EOS KISS M / EOS M50 firmware version 1.0.2 and earlier) and PowerShot SX740 HS firmware version 1.0.1 and earlier, PowerShot SX70 HS firmware version 1.1.0 and earlier, and PowerShot G5Xmark II firmware version 1.0.1 and earlier allows an attacker on the same network segment to trigger the affected product being unresponsive or to execute arbitrary code on the affected product via setadapterbatteryreport command. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/vu/JVNVU97511331/index.html"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://cweb.canon.jp/e-support/products/eos-d/190806dilc-firm.html"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.canon-europe.com/support/product-security/"
},
{
"source": "[email protected]",
"tags": [
"Vendor Advisory"
],
"url": "https://www.usa.canon.com/internet/portal/us/home/support/product-advisories/detail/the-vulnerability-in-canon-digital-cameras"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B41EAE-6CFC-4142-947F-9570416B8430",
"versionEndExcluding": null,
"versionEndIncluding": "2.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D900D931-52FA-4A7C-B1F0-4ED7FF16B590",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_x_mkii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "115C8AE1-7F4E-4F4C-B6E0-8BACCB058E0F",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.6",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_x_mkii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A01C7E96-4DEC-4153-B5B4-AA5A73DA8EAE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos-1d_c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE43279D-728C-457D-99D2-9FE0F1AE89EE",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos-1d_c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B883DD17-1FAB-463A-A697-595F47C17629",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5d_mark_iii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC81188A-A334-4BE4-8382-91ADC6678473",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5d_mark_iii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "489E40A9-5999-47AA-A527-C54E509C724B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5d_mark_iv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "060396F2-96C0-4058-B671-85B9FBEB007B",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5d_mark_iv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F8DEB8B-9CC8-4E67-B059-3556720BF83B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5ds_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A545F7D1-97BA-495B-BE15-7F1DB1DD5BEC",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5ds:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52F07C57-B580-4590-A8AB-7717052BDEFA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_5ds_r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81092A79-2651-4E01-A5C1-FF1B79EC99AE",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_5ds_r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE5DF31C-6D16-4BEE-968F-549786AEDD95",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_6d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "49FB54E4-B118-4DE6-93CE-BA703E0341DE",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.8",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_6d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FFA6C61-D190-460D-A7E0-EDC50DC6A47B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_7d_mark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C287C13F-2188-42E3-873A-3F8BF002FB9E",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_7d_mark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29EB7B3D-1BC5-44D7-9691-6161C9D0F637",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_70d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB2F1134-917A-430A-BB11-99D822045D0E",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_70d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9949BC8A-BA70-48F3-AEBD-9A3EE0B00E6B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_80d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75FBB900-929A-43DA-8DFA-8709D0CDCD2C",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_80d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78791BA-1FC4-423B-A51A-79201B3D835C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x7i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94517FFB-1A37-4921-8379-41A640BCB773",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x7i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3301D22-8BDC-4C8A-B4CD-6CF338DB8534",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16655C13-8EED-4F50-8D5E-A2E1DD45CC53",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04CD4A54-856A-4E97-AD00-EE662FD79F51",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_700d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BAA428E-E2DB-40B6-94B1-5DFFAE8445D9",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_700d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2986DD7-AEDB-416B-BF6E-E1A65AFB3D22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x8i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "313420F0-2076-416F-AE26-D81501D5D96A",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x8i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF28AD1-CF83-41FD-AF90-D9E58EB13AB0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "550C3683-14BA-4CE0-A518-8B748B179104",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D63EFD4-D98F-4066-A04E-C8332FDC88CB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_750d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE92DE01-9587-4B49-A30D-1ACFA21A1237",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_750d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1711827E-E6DC-4AEA-BB38-FE836C75F97D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x9i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4F7E5D8-0FE9-4B67-B6A4-F45B47429384",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x9i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9045D5D-84CB-4C89-BBEC-9DF4DF99C1EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t7i_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AECEE371-A8BD-420E-B758-244CAD9037BB",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t7i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E977062-3B82-4FC5-9289-808C2144D94E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_800d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "881A3902-43E7-418C-A2A0-D25C2EDCD011",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_800d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B1D3708-29DC-4153-9D7C-D21D1CCC8DAF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DAD909A-A037-497E-B07F-914CB64E6A9F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDEC1E1-69BF-4551-96FF-BC9AB9D9BB9B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3EAADDF-F7AB-4C66-A2B9-40AC7452D372",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D8A4070-548E-4425-A46F-2EE6BB65B119",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_100d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28B213ED-9472-4E3A-9E05-70AB24207966",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_100d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "466391FD-1F08-4DA0-8404-C041599C1366",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6B9C1F-974B-44E4-9BA1-6D31089E13EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x9_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BB22EC-5BC8-45FB-8E52-086812BC1546",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CE3620C-45D8-4A91-9350-9CC2B30D3796",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "726F2082-AB0E-4E37-96AD-80B4237B438B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C9F004-59CC-47A7-B308-C918DA1C3103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F06FEE37-9060-4B79-A24E-BACBC19E0FDF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3D0A03-8ABE-4EB3-AAAD-1E1DA29C14BD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F876428-9FB9-4C50-8873-CCEA75AFB426",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_sl3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9BF9B43-803C-45EC-8B45-22C6CCE1CC3B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_sl3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20AD1E6B-B9A2-493E-B075-5D18F2E8E53F",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F06FEE37-9060-4B79-A24E-BACBC19E0FDF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C9F004-59CC-47A7-B308-C918DA1C3103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_250d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57693A68-0B3E-4DE5-B563-DA124199EDF3",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_250d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B81633B6-8CE2-4D83-92E3-634756127620",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_8000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0C89004-64CF-4B49-9D69-313A2D56F339",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_8000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B301D4DB-1EF8-4162-83EB-66B533052047",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF427FA-1455-4CDF-8E69-E5A3543E5728",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF0A7AA-A115-4110-8E72-746C00CC4033",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_760d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57B53943-4AEB-4AD9-8E34-AF64B96A6D68",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_760d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A40C05-C50F-4D73-B640-782B07DFE9AB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_9000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D2A3393-3DB9-4B83-9F32-4FAD1C66D35D",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_9000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3802327-3156-45A7-827D-C94CD68AC389",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_77d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11C783F5-81D9-4C9D-8D24-DBB0BBA6DEAC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_77d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A6FAAC-1362-496F-9567-C168E90B29B7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x70_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EA6C79B-E124-4CB9-ACA9-85F939B1701B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x70:-:*:*:*:*:*:*:*",
"matchCriteriaId": "133D14D9-4A81-4FE4-96E4-15E741903C84",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7957441E-8476-4E0A-8E12-1D6ABBBD0B4E",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39E9A117-A0F6-4C79-9D66-2EED88883010",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1200d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E5064C5-51C1-412C-8145-8561C3592D8B",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1200d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F141B5D-70AD-41ED-BEA0-A880A6B415AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t5_re_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79296E01-0977-4A46-B54E-38E08FC640F9",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t5_re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0165438-12A3-40E4-9FB0-B57EC1CAB6CA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1200d_mg_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "022D3E5E-1109-44C7-AB63-489C11AE89FE",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1200d_mg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30073057-8B4F-4A85-A062-DABFE3816821",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_hi_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1CB6DE0-E9E3-47E1-9DD6-217F00F911C9",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_hi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B37853E-DA5B-468A-9E2A-B7DA45F5338E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x80_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0292A9A-81D2-4834-BB56-03D4D1F70E8F",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x80:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53F32AEE-9C79-4449-89F9-36ACF5ACCAAF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t6_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "032CEA19-3687-4687-BBE3-6E42C816DA09",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB28EBA9-8BC9-48FF-A858-69D866FBEE63",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1300d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C23F53-7875-466D-8750-154FDF85B4B5",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1300d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62C62C20-695C-4E7E-A0DE-D205131B7406",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_x90_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2AE5E5B6-8A75-4FC0-B161-2BEC0A36B359",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_x90:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9E4CED-A511-498F-AB15-FDDB2BC5DE0C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3CA9BF4-6A9B-4E17-999F-F6F738699116",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8ACA7F44-9F78-40CE-BDA7-96013B3BD137",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_1500d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD5DCC6-06C0-43ED-8CC7-D8C0F5E2134F",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_1500d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F289482-2B2A-40A3-B473-268B38E4864F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_2000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D2B3E84-00C6-4371-8A41-459B49D63606",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_2000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D36E69CD-A095-4D3E-A86F-9F0AA0FA6F91",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_d_rebel_t100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E792C6AE-52B7-4075-9FB3-A54C027FD351",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_d_rebel_t100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC96B6D1-6EF5-4483-A27B-E3D91A803420",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_3000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23C1956F-B3F7-47D7-B85D-408F78283623",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_3000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F93BF881-57E7-4EC2-99B6-6D0454A3B67A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_4000d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D87306A6-AF3F-4B90-9C47-4A61E25F273C",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_4000d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54316C9A-0BF3-43EF-AF01-97E453E08B84",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE65951A-B6AC-4719-BD29-B6D6B02CDBDE",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B5B8A44-8511-41E9-8AD1-B44F2524FD8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_rp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07864E4A-DFC2-4F94-86FE-F64C5825DC70",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_rp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85C1EC49-5691-42A0-AD48-7612674F95C2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_rp_gold_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF3923BA-A7B1-4167-AE79-7632C443C2BE",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_rp_gold:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F36D91E0-13C1-4465-9B7E-9F465F53AEC8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F62AD1C8-6487-4B84-8879-5262801051F1",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.3",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE706B6-F706-45BB-95E5-7CBA3C186BA9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEA9741C-B1B7-4552-8952-BD9D7B00DF58",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0E26818-C97C-4551-A06A-41FD51202FC7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F020BDB5-7012-4DEB-A60F-B65492F4C7CF",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D09A072-28A0-4E1B-9627-EC23166DE09E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m6_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6120F799-2FF3-4DFF-91EF-80B345F96111",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C2D504-1CE1-45D2-B09F-48D89D7C4587",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m6\\(china\\)_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4382BB-51E7-486C-AFBC-2B559905DFBC",
"versionEndExcluding": null,
"versionEndIncluding": "5.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m6\\(china\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "DED4A602-417C-47C6-B78F-5C1D14AF0A33",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9CC311-58D9-450F-B204-C9215A604358",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1A1144-77DA-4BF9-84F4-273BFEB3C626",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E99864D-6BA3-4136-87AA-7FE2C5462F94",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "082679E2-82A8-4501-9866-B3335CE2090F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_kiss_m_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3927F40-B5E5-4076-8990-0FB44853D6AC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_kiss_m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF443D78-4C04-4276-BA8E-BE2ADC368287",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_m50_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15728BA0-702E-4A87-B20F-00B79D938A75",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_m50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D929C30A-59C4-43F0-B928-941454D9F6D2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_sx740_hs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50564BC7-F034-4B96-9590-34A1714A61E8",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_sx740_hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "396924EF-075F-48D5-80FF-723A4418F1DD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_sx70_hs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "412BF37C-129C-46DB-87B6-AF0DFF6D6EEA",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_sx70_hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8EA82F6-BC50-4F75-AB50-F0DAECFA8CCC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:powershot_g5xmark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A7465D6-F425-4B46-91B8-2A3FCEF0B0FC",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:powershot_g5xmark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC2077A-2038-4C4B-82AC-D55B24C37D41",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canon:eos_6d_mark_ii_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37D03B7E-31D1-4DAB-8AB5-A6119E5B9C70",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.4",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:canon:eos_6d_mark_ii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29A0F9B9-4660-4B49-BE56-1BECA639215F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | 10,414 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.