| 
84 | 84 |         "defaultStatus": "unaffected"  | 
85 | 85 |       }  | 
86 | 86 |     ],  | 
 | 87 | +    "cpeApplicability": [  | 
 | 88 | +      {  | 
 | 89 | +        "operator": "AND",  | 
 | 90 | +        "nodes": [  | 
 | 91 | +          {  | 
 | 92 | +            "operator": "OR",  | 
 | 93 | +            "negate": false,  | 
 | 94 | +            "cpeMatch": [  | 
 | 95 | +              {  | 
 | 96 | +                "vulnerable": true,  | 
 | 97 | +                "criteria": "cpe:2.3:a:example_org:example_enterprise:*:*:*:*:*:*:*:*",  | 
 | 98 | +                "versionStartIncluding": "1.0.0",  | 
 | 99 | +                "versionEndExcluding": "1.0.6"  | 
 | 100 | +              },  | 
 | 101 | +              {  | 
 | 102 | +                "vulnerable": true,  | 
 | 103 | +                "criteria": "cpe:2.3:a:example_org:example_enterprise:*:*:*:*:*:*:*:*",  | 
 | 104 | +                "versionStartIncluding": "2.1.6",  | 
 | 105 | +                "versionEndExcluding": "2.1.9"  | 
 | 106 | +              }  | 
 | 107 | +            ]  | 
 | 108 | +          },  | 
 | 109 | +          {  | 
 | 110 | +            "operator": "OR",  | 
 | 111 | +            "negate": false,  | 
 | 112 | +            "cpeMatch": [  | 
 | 113 | +              {  | 
 | 114 | +                "vulnerable": false,  | 
 | 115 | +                "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"  | 
 | 116 | +              },  | 
 | 117 | +              {  | 
 | 118 | +                "vulnerable": false,  | 
 | 119 | +                "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"  | 
 | 120 | +              },  | 
 | 121 | +              {  | 
 | 122 | +                "vulnerable": false,  | 
 | 123 | +                "criteria": "cpe:2.3:h:some_company:xt-4500:*:*:*:*:*:*:*:*"  | 
 | 124 | +              }  | 
 | 125 | +            ]  | 
 | 126 | +          }  | 
 | 127 | +        ]  | 
 | 128 | +      }  | 
 | 129 | +    ],  | 
87 | 130 |     "descriptions": [  | 
88 | 131 |       {  | 
89 | 132 |         "lang": "en",  | 
90 |  | -        "value": "OS Command Injection vulnerability parseFilename function of example.php in the Web Management Interface of Example.org Example Enterprise on Windows, macOS, and XT-4500 allows remote unauthenticated attackers to escalate privileges. This issue affects: 1.0 versions before 1.0.6, 2.1 versions from 2.16 until 2.1.9.",  | 
 | 133 | +        "value": "OS Command Injection vulnerability parseFilename function of example.php in the Web Management Interface of Example.org Example Enterprise on Windows, macOS, and XT-4500 allows remote unauthenticated attackers to escalate privileges. This issue affects: 1.0 versions before 1.0.6, 2.1 versions from 2.1.6 until 2.1.9.",  | 
91 | 134 |         "supportingMedia": [  | 
92 | 135 |           {  | 
93 | 136 |             "type": "text/html",  | 
94 | 137 |             "base64": false,  | 
95 |  | -            "value": "OS Command Injection vulnerability <tt>parseFilename</tt> function of <tt>example.php</tt> in the Web Management Interface of Example.org Example Enterprise on Windows, macOS, and XT-4500 allows remote unauthenticated attackers to escalate privileges.<br><br>This issue affects:<br><ul><li>1.0 versions before 1.0.6</li><li>2.1 versions from 2.16 until 2.1.9.</li></ul>"  | 
 | 138 | +            "value": "OS Command Injection vulnerability <tt>parseFilename</tt> function of <tt>example.php</tt> in the Web Management Interface of Example.org Example Enterprise on Windows, macOS, and XT-4500 allows remote unauthenticated attackers to escalate privileges.<br><br>This issue affects:<br><ul><li>1.0 versions before 1.0.6</li><li>2.1 versions from 2.1.6 until 2.1.9.</li></ul>"  | 
96 | 139 |           }  | 
97 | 140 |         ]  | 
98 | 141 |       },  | 
99 | 142 |       {  | 
100 | 143 |         "lang": "eo",  | 
101 |  | -        "value": "OS-komand-injekta vundebleco parseFilename funkcio de example.php en la Web Administrado-Interfaco de Example.org Example Enterprise \u0109e Windows, macOS kaj XT-4500 permesas al malproksimaj nea\u016dtentikigitaj atakantoj eskaladi privilegiojn. \u0108i tiu afero efikas: 1.0-versioj anta\u016d 1.0.6, 2.1-versioj de 2.16 \u011dis 2.1.9.",  | 
 | 144 | +        "value": "OS-komand-injekta vundebleco parseFilename funkcio de example.php en la Web Administrado-Interfaco de Example.org Example Enterprise \u0109e Windows, macOS kaj XT-4500 permesas al malproksimaj nea\u016dtentikigitaj atakantoj eskaladi privilegiojn. \u0108i tiu afero efikas: 1.0-versioj anta\u016d 1.0.6, 2.1-versioj de 2.1.6 \u011dis 2.1.9.",  | 
102 | 145 |         "supportingMedia": [  | 
103 | 146 |           {  | 
104 | 147 |             "type": "text/html",  | 
105 | 148 |             "base64": false,  | 
106 |  | -            "value": "OS-komand-injekta vundebleco <tt>parseFilename</tt> funkcio de <tt>example.php</tt> en la Web Administrado-Interfaco de Example.org Example Enterprise \u0109e Windows, macOS kaj XT-4500 permesas al malproksimaj nea\u016dtentikigitaj atakantoj eskaladi privilegiojn.<br><br> \u0108i tiu afero efikas:<br><ul><li>1.0-versioj anta\u016d 1.0.6</li><li>2.1-versioj de 2.16 \u011dis 2.1.9.</li></ul>"  | 
 | 149 | +            "value": "OS-komand-injekta vundebleco <tt>parseFilename</tt> funkcio de <tt>example.php</tt> en la Web Administrado-Interfaco de Example.org Example Enterprise \u0109e Windows, macOS kaj XT-4500 permesas al malproksimaj nea\u016dtentikigitaj atakantoj eskaladi privilegiojn.<br><br> \u0108i tiu afero efikas:<br><ul><li>1.0-versioj anta\u016d 1.0.6</li><li>2.1-versioj de 2.1.6 \u011dis 2.1.9.</li></ul>"  | 
107 | 150 |           }  | 
108 | 151 |         ]  | 
109 | 152 |       }  | 
 | 
0 commit comments