CVE-2018-0689 (GCVE-0-2018-0689)
Vulnerability from cvelistv5 – Published: 2019-01-09 22:00 – Updated: 2024-08-05 03:35
VLAI?
Summary
HTTP header injection vulnerability in SEIKO EPSON printers and scanners (DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7) may allow a remote attackers to lead a user to a phishing site or execute an arbitrary script on the user's web browser.
Severity ?
No CVSS data available.
CWE
- HTTP header injection
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| SEIKO EPSON CORPORATION | SEIKO EPSON printers and scanners |
Affected:
(DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions release ...[truncated*]
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T03:35:48.994Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.epson.jp/support/misc/20181203_oshirase.htm"
},
{
"name": "JVN#89767228",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN89767228/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SEIKO EPSON printers and scanners",
"vendor": "SEIKO EPSON CORPORATION",
"versions": [
{
"status": "affected",
"version": "(DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions release ...[truncated*]"
}
]
}
],
"datePublic": "2019-01-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "HTTP header injection vulnerability in SEIKO EPSON printers and scanners (DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7) may allow a remote attackers to lead a user to a phishing site or execute an arbitrary script on the user\u0027s web browser."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "HTTP header injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-01-09T21:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.epson.jp/support/misc/20181203_oshirase.htm"
},
{
"name": "JVN#89767228",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "https://jvn.jp/en/jp/JVN89767228/index.html"
}
],
"x_ConverterErrors": {
"version_name": {
"error": "version_name too long. Use array of versions to record more than one version.",
"message": "Truncated!"
}
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2018-0689",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SEIKO EPSON printers and scanners",
"version": {
"version_data": [
{
"version_value": "(DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7)"
}
]
}
}
]
},
"vendor_name": "SEIKO EPSON CORPORATION"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "HTTP header injection vulnerability in SEIKO EPSON printers and scanners (DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7) may allow a remote attackers to lead a user to a phishing site or execute an arbitrary script on the user\u0027s web browser."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "HTTP header injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.epson.jp/support/misc/20181203_oshirase.htm",
"refsource": "MISC",
"url": "https://www.epson.jp/support/misc/20181203_oshirase.htm"
},
{
"name": "JVN#89767228",
"refsource": "JVN",
"url": "https://jvn.jp/en/jp/JVN89767228/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2018-0689",
"datePublished": "2019-01-09T22:00:00",
"dateReserved": "2017-11-27T00:00:00",
"dateUpdated": "2024-08-05T03:35:48.994Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ds-570w_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-03-13\", \"matchCriteriaId\": \"49AF1989-AAD6-4F13-B2D8-53E9D9BB1261\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ds-570w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68638A6A-8B9B-4BAE-BFF7-E8243DBBC299\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ds-780n_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-03-13\", \"matchCriteriaId\": \"2B6C0113-489B-4195-9DA8-AE77041366A7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ds-780n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36270A93-D2E4-4314-A0E5-F16A8B2A79FF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-10va_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-09-04\", \"matchCriteriaId\": \"2B2CA763-DCE2-4BC0-9630-B46DB9C8921E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-10va:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DE0E8F7-177E-4192-85ED-C584B8247EEC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-30va_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-19\", \"matchCriteriaId\": \"5F6E1C55-B946-4B24-B55A-B3ABA74AED7E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-30va:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1BF1431-A677-4F4B-8316-E9EC8498716C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-707a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-01\", \"matchCriteriaId\": \"A775CF56-EAF6-46F2-BE96-7D4D5E2D3996\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-707a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61BB3AA3-CDDB-44A7-95FF-D12CBC578621\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-708a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-07\", \"matchCriteriaId\": \"401010D8-E5E4-4BE7-86C8-788DA50C6BE8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-708a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A390331E-CD71-400A-8016-C3AD760E4BE1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-709a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-12\", \"matchCriteriaId\": \"8AAE9A44-4F14-4C0D-9DFE-0D4930AF1CA2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-709a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BD20550-33A6-4135-90F8-D2A090F5D421\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-777a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-01\", \"matchCriteriaId\": \"E7DA43F1-310B-469E-A8FA-C9B892D95EE1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-777a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95F439CB-3A53-4E37-8733-BD536DDB314B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-807ab_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-01\", \"matchCriteriaId\": \"83229C68-3A6E-4E56-B9CB-5E583FCAC443\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-807ab:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1297F697-5957-4EA9-A38D-D9A7170BC4A4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-807aw_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-01\", \"matchCriteriaId\": \"D9E5EE91-18B1-4DFD-A208-01478605392C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-807aw:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71401329-9B3C-41AB-800D-8B96356F8AD5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-807ar_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-01\", \"matchCriteriaId\": \"D2555C06-E04F-4521-925C-9F0A52006204\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-807ar:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18496B97-CE7F-426E-BECD-0FF0C94E12A4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-808ab_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-07\", \"matchCriteriaId\": \"EAA2363D-587C-4F3E-B77E-D7A87C5B22CA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-808ab:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"250EF752-66E8-4BA5-BC91-7485B516CD07\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-808aw_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-07\", \"matchCriteriaId\": \"3A46AC7C-DA8B-4020-B1E3-BDBD61E38BA5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-808aw:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BAE606C-990C-47E8-9A94-3F2398A938F9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-808ar_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-07\", \"matchCriteriaId\": \"2A5BA4CA-069F-426D-A858-7C2B6FDAFA59\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-808ar:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"768D52ED-F5E4-438C-8EE5-385CDD20BDB0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-879ab_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-12\", \"matchCriteriaId\": \"35710EC7-FE8E-4C7E-BB29-1BB164FFE82A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-879ab:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F169E7BA-4E2E-4651-AF4E-487BF4997FF1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-879aw_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-12\", \"matchCriteriaId\": \"4F154A72-E6B2-4CBC-9091-BAD877E85491\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-879aw:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BD419CE-E2FC-4B94-8E8E-91BEDADBB4F3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-879ar_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-12\", \"matchCriteriaId\": \"6AA02171-2F93-4F57-83BB-F2376421BE76\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-879ar:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0B9CA95-A16B-4A21-AF9F-C3CB571965AC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-907f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-01\", \"matchCriteriaId\": \"6697AA35-35EF-42E7-AC4C-7DAB81F551D3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-907f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7D801C2-0AB0-4A60-B191-2FE681E003A9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-977a3_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-01\", \"matchCriteriaId\": \"3669AE48-FF0F-4762-AF70-ED3EF7E783E7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-977a3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B6E087C-01D7-4A0D-95C2-B4DF4D118F1B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-978a3_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-07\", \"matchCriteriaId\": \"EFE8ED05-C494-4DE5-BB67-A84231982542\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-978a3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C988BDD-9189-475C-B203-C139109AEB58\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-979a3_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-12\", \"matchCriteriaId\": \"EA1FF85E-527C-4514-89DD-125705181961\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-979a3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86DC2CD3-C1F8-4A56-AC74-EBF0E361307D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-m570t_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-09-06\", \"matchCriteriaId\": \"22626AF8-EA5B-4653-A36B-ED42D25F7AF6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-m570t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9CA7120-0F70-42F1-964D-5FF77B2617DA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ew-m5071ft_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-11-02\", \"matchCriteriaId\": \"FE0DF1EA-F31B-4256-921B-36DC07246679\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ew-m5071ft:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06E26444-5560-4A2D-A0B6-42F2CF4B513C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ew-m660ft_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-04-19\", \"matchCriteriaId\": \"4342A0F1-45FB-4AA6-B1DD-ED7C7DC24EA5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ew-m660ft:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16233516-D1F6-4F1B-809F-694F8F50D767\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ew-m770t_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-09-06\", \"matchCriteriaId\": \"5F507ACB-58F1-4490-88C7-DF5D214BFADA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ew-m770t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B69A65C2-1BF3-42D3-B601-175C1807C027\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:pf-70_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-04-20\", \"matchCriteriaId\": \"18B0B5C5-1011-4494-9F85-7B98D8F2155E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:pf-70:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"433BB7EF-B394-4EFD-809C-F969CE198C62\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:pf-71_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-07-18\", \"matchCriteriaId\": \"7F572BF4-08D2-4F34-8073-EB84CB4511C5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:pf-71:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B276605A-9181-477F-B295-48D09D99472B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:pf-81_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-09-14\", \"matchCriteriaId\": \"06DF2692-B1FD-4DAD-AB29-3C12A1C7A202\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:pf-81:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9ACB289E-801F-4B77-87D0-39AB206DFCE1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-048a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-07-04\", \"matchCriteriaId\": \"0B6DE709-3A8B-48AD-83CB-FEAC89874B7D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-048a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85BBF56B-A7DA-40C7-95EF-5FE341AB0422\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-049a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-09-11\", \"matchCriteriaId\": \"2F3B6765-7F12-44AE-92E1-511B8F413127\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-049a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5136484-F793-4EF8-BE37-7D70B438A499\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-437a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-07-24\", \"matchCriteriaId\": \"8035F9DD-F45C-4996-9920-7EAC54782F8F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-437a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29F2937E-4F08-4765-B502-EBDB78FD1E04\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m350f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-02-23\", \"matchCriteriaId\": \"F4C1A5D1-6673-4A41-90D6-3796E6D88284\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m350f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B9A0ECF-89CC-4F83-83D5-DB73280B7553\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m5040f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-11-20\", \"matchCriteriaId\": \"98A05D05-F166-4C54-9485-4C72FA0CADC9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m5040f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8123D9F0-5AFB-4BE8-9C3F-B9E04FA4025E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m5041f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-11-20\", \"matchCriteriaId\": \"380061E0-B60B-4917-BDFE-E4B03D275855\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m5041f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"697538F4-2803-4146-B110-10D0208D14EB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m650a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-10-17\", \"matchCriteriaId\": \"DBC9C187-1F7B-41CC-B277-BFE58E67CA9D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m650a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A3DE254-BCB7-495F-B2B4-A29A7FDFCB72\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m650f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-10-17\", \"matchCriteriaId\": \"C7922A73-72F2-478C-B280-458715A1EF9E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m650f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85509B44-22A4-4DBA-B80B-4612A423A41F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m680f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-29\", \"matchCriteriaId\": \"B893FE32-26AF-4E19-9DFC-EE491119E3B1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m680f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BCC5F18-20B4-4CDC-A864-1359C351C374\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m7050f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-10-13\", \"matchCriteriaId\": \"EDF11770-B243-48EA-8D19-B5D78FACBE5B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m7050f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA1C3A4F-3350-4F5A-86C4-C9C7118BA86C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m7050fp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-10-13\", \"matchCriteriaId\": \"A461F967-9BF6-43D5-993B-8C4E8388EB35\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m7050fp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83E2A379-597D-4816-A23A-A988072C6A53\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m7050fx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-11-07\", \"matchCriteriaId\": \"0A77D819-CEA5-42D0-9C03-CA69186750EA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m7050fx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AF40258-3D4C-46A8-A316-BA01938BF17A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m7070fx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-04-27\", \"matchCriteriaId\": \"EA82F03D-E08D-44A8-A3D8-09F3736F933F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m7070fx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4EAE16D1-DAAB-40F9-BAD4-AF1823ADA87A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m740f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-29\", \"matchCriteriaId\": \"828D72F9-77A2-4BA0-9A02-C2BE38EC41B3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m740f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D9D340A-212B-42F8-8752-7C14B169E594\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m781f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-27\", \"matchCriteriaId\": \"8BD392A1-DBB3-48D3-A44C-357E0EFFAF59\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m781f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7B6B9CC-0812-4917-9766-CDD84A0666F2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m840f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-11-16\", \"matchCriteriaId\": \"3CC14918-1C9F-4EC8-ABF8-7D61813AFA92\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m840f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81C22502-8926-423B-9901-46334E1B2EAB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m840fx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-12-08\", \"matchCriteriaId\": \"C2E0D7F3-711B-4F99-A310-B801FA179EFD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m840fx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC28AC8E-85DA-4158-8167-17DF69D09011\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m860f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-10-25\", \"matchCriteriaId\": \"51F8F97B-1E66-40A8-B709-80103F37A7E0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m860f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B36A511-6A59-4B1A-AAB0-AA698FD240C8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s05b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-03-09\", \"matchCriteriaId\": \"FD48ADCA-3437-4AF5-BF49-D26EDC15F581\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s05b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FD0EE8F-CF0C-45C7-BDBE-CD00D8D39B6D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s05w_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-03-09\", \"matchCriteriaId\": \"DC2AB6EC-900B-4E43-A93A-7A09EC41A816\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s05w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90D992C6-6399-4573-B181-B5E6170A7FFB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s350_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-02-23\", \"matchCriteriaId\": \"BE0E9589-690B-4CA9-8A53-DD29D25FA095\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s350:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64B8CAE8-16FE-4712-A360-AFE61B602021\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s5040_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-11-20\", \"matchCriteriaId\": \"09205B5E-CBC3-4AF6-824D-E534F6228ED5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s5040:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9416BADB-FB07-4E5A-B14C-16A65D7F9537\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s7050_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-02-21\", \"matchCriteriaId\": \"AA375B8C-8ADF-4C88-93B7-10041D00E310\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s7050:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AD41CBB-F15B-4A23-B432-8CFF23FD0597\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s7050ps_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-02-21\", \"matchCriteriaId\": \"CB4035F7-6592-4379-B200-07C139C279F3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s7050ps:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"512AF91A-285D-4E31-9688-425CBB0D121E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s7050x_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-11-07\", \"matchCriteriaId\": \"D3658F0F-6B2E-4CAB-B010-5D43EFA60C55\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s7050x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CEBD057-E928-4387-88D0-028A25BE32F0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s7070x_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-04-27\", \"matchCriteriaId\": \"D0A84064-58C9-491C-91B3-459FD4218AAD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s7070x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5E04ED4-A885-49FF-906C-340DB15285EB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s740_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-12-03\", \"matchCriteriaId\": \"A68DACA7-4082-4E75-95C0-D960EA19B518\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s740:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B63572C3-D000-4342-9807-859C5901CA56\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s840_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-11-16\", \"matchCriteriaId\": \"E4F77FE3-1C8A-4C6A-81BD-9814EFCB7C01\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s840:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBE73B65-BC10-4E25-9572-5023113B8B6E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s840x_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-12-08\", \"matchCriteriaId\": \"05985298-3F39-46C4-B3DA-625600A59987\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s840x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BB1AC4D-E62E-49A0-8E33-4E4AF3990C63\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s860_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-12-07\", \"matchCriteriaId\": \"0DD9018F-914C-43F3-9087-44C9A0B47830\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s860:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27B7576F-A929-4A8A-9618-D815E2F7890B\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"HTTP header injection vulnerability in SEIKO EPSON printers and scanners (DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7) may allow a remote attackers to lead a user to a phishing site or execute an arbitrary script on the user\u0027s web browser.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de inyecci\\u00f3n de cabeceras HTTP en impresoras y esc\\u00e1neres SEIKO EPSON (DS-570W en versiones de firmware anteriores al 13/03/2018, DS-780N en versiones anteriores al 13/03/2018, EP-10VA en versiones anteriores al 04/09/2017, EP-30VA en versiones anteriores al 19/06/2017, EP-707A firmware en versiones anteriores al 01/08/2017, EP-708A firmware en versiones anteriores al 07/08/2017, EP-709A firmware en versiones anteriores al 12/06/2017, EP-777A en versiones anteriores al 01/08/2017, EP-807AB/AW/AR en versiones anteriores al 01/08/2017, EP-808AB/AW/AR en versiones anteriores al 07/08/2017, EP-879AB/AW/AR en versiones anteriores al 12/06/2017, EP-907F en versiones anteriores al 01/08/2017, EP-977A3 en versiones anteriores al 01/08/2017, EP-978A3 en versiones anteriores al 07/08/2017, EP-979A3 en versiones anteriores al 12/06/2017, EP-M570T en versiones anteriores al 06/09/2017, EW-M5071FT en versiones anteriores al 02/11/2017, EW-M660FT en versiones anteriores al 19/04/2017, EW-M770T en versiones anteriores al 06/09/2017, PF-70 en versiones anteriores al 20/04/2018, PF-71 en versiones anteriores al 18/07/2017, PF-81 en versiones anteriores al 14/09/2017, PX-048A en versiones anteriores al 04/07/2017, PX-049A en versiones anteriores al 11/09/2017, PX-437A en versiones anteriores al 24/07/2017, PX-M350F en versiones anteriores al 23/02/2017, PX-M5040F en versiones anteriores al 20/11/2017, PX-M5041F en versiones anteriores al 20/11/2017, PX-M650A en versiones anteriores al 17/10/2017, PX-M650F en versiones anteriores al 17/10/2017, PX-M680F en versiones anteriores al 29/06/2017, PX-M7050F en versiones anteriores al 13/10/2017, PX-M7050FP en versiones anteriores al 13/10/2017, PX-M7050FX en versiones anteriores al 07/11/2017, PX-M7070FX en versiones anteriores al 27/04/2017, PX-M740F en versiones anteriores al 04/12/2017, PX-M741F en versiones anteriores al 04/12/2017, PX-M780F en versiones anteriores al 29/06/2017, PX-M781F en versiones anteriores al 27/06/2017, PX-M840F en versiones anteriores al 16/11/2017, PX-M840FX en versiones anteriores al 08/12/2017, PX-M860F en versiones anteriores al 25/10/2017, PX-S05B/W en versiones anteriores al 09/03/2018, PX-S350 en versiones anteriores al 23/02/2018, PX-S5040 en versiones anteriores al 20/11/2017, PX-S7050 en versiones anteriores al 21/02/2018, PX-S7050PS en versiones anteriores al 21/02/2018, PX-S7050X en versiones anteriores al 07/11/2017, PX-S7070X en versiones anteriores al 27/04/2017, PX-S740 en versiones anteriores al 03/12/2017, PX-S840 en versiones anteriores al 16/11/2017, PX-S840X en versiones anteriores al 08/12/2017, PX-S860 en versiones anteriores al 07/12/2017) podr\\u00eda permitir que atacantes remotos conduzcan a un usuario a un sitio de phishing o ejecuten un script arbitrario en el navegador web del usuario.\"}]",
"id": "CVE-2018-0689",
"lastModified": "2024-11-21T03:38:44.997",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2019-01-09T23:29:01.997",
"references": "[{\"url\": \"https://jvn.jp/en/jp/JVN89767228/index.html\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.epson.jp/support/misc/20181203_oshirase.htm\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://jvn.jp/en/jp/JVN89767228/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.epson.jp/support/misc/20181203_oshirase.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-113\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-0689\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2019-01-09T23:29:01.997\",\"lastModified\":\"2024-11-21T03:38:44.997\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"HTTP header injection vulnerability in SEIKO EPSON printers and scanners (DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7) may allow a remote attackers to lead a user to a phishing site or execute an arbitrary script on the user\u0027s web browser.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de inyecci\u00f3n de cabeceras HTTP en impresoras y esc\u00e1neres SEIKO EPSON (DS-570W en versiones de firmware anteriores al 13/03/2018, DS-780N en versiones anteriores al 13/03/2018, EP-10VA en versiones anteriores al 04/09/2017, EP-30VA en versiones anteriores al 19/06/2017, EP-707A firmware en versiones anteriores al 01/08/2017, EP-708A firmware en versiones anteriores al 07/08/2017, EP-709A firmware en versiones anteriores al 12/06/2017, EP-777A en versiones anteriores al 01/08/2017, EP-807AB/AW/AR en versiones anteriores al 01/08/2017, EP-808AB/AW/AR en versiones anteriores al 07/08/2017, EP-879AB/AW/AR en versiones anteriores al 12/06/2017, EP-907F en versiones anteriores al 01/08/2017, EP-977A3 en versiones anteriores al 01/08/2017, EP-978A3 en versiones anteriores al 07/08/2017, EP-979A3 en versiones anteriores al 12/06/2017, EP-M570T en versiones anteriores al 06/09/2017, EW-M5071FT en versiones anteriores al 02/11/2017, EW-M660FT en versiones anteriores al 19/04/2017, EW-M770T en versiones anteriores al 06/09/2017, PF-70 en versiones anteriores al 20/04/2018, PF-71 en versiones anteriores al 18/07/2017, PF-81 en versiones anteriores al 14/09/2017, PX-048A en versiones anteriores al 04/07/2017, PX-049A en versiones anteriores al 11/09/2017, PX-437A en versiones anteriores al 24/07/2017, PX-M350F en versiones anteriores al 23/02/2017, PX-M5040F en versiones anteriores al 20/11/2017, PX-M5041F en versiones anteriores al 20/11/2017, PX-M650A en versiones anteriores al 17/10/2017, PX-M650F en versiones anteriores al 17/10/2017, PX-M680F en versiones anteriores al 29/06/2017, PX-M7050F en versiones anteriores al 13/10/2017, PX-M7050FP en versiones anteriores al 13/10/2017, PX-M7050FX en versiones anteriores al 07/11/2017, PX-M7070FX en versiones anteriores al 27/04/2017, PX-M740F en versiones anteriores al 04/12/2017, PX-M741F en versiones anteriores al 04/12/2017, PX-M780F en versiones anteriores al 29/06/2017, PX-M781F en versiones anteriores al 27/06/2017, PX-M840F en versiones anteriores al 16/11/2017, PX-M840FX en versiones anteriores al 08/12/2017, PX-M860F en versiones anteriores al 25/10/2017, PX-S05B/W en versiones anteriores al 09/03/2018, PX-S350 en versiones anteriores al 23/02/2018, PX-S5040 en versiones anteriores al 20/11/2017, PX-S7050 en versiones anteriores al 21/02/2018, PX-S7050PS en versiones anteriores al 21/02/2018, PX-S7050X en versiones anteriores al 07/11/2017, PX-S7070X en versiones anteriores al 27/04/2017, PX-S740 en versiones anteriores al 03/12/2017, PX-S840 en versiones anteriores al 16/11/2017, PX-S840X en versiones anteriores al 08/12/2017, PX-S860 en versiones anteriores al 07/12/2017) podr\u00eda permitir que atacantes remotos conduzcan a un usuario a un sitio de phishing o ejecuten un script arbitrario en el navegador web del usuario.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-113\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ds-570w_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-03-13\",\"matchCriteriaId\":\"49AF1989-AAD6-4F13-B2D8-53E9D9BB1261\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ds-570w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68638A6A-8B9B-4BAE-BFF7-E8243DBBC299\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ds-780n_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-03-13\",\"matchCriteriaId\":\"2B6C0113-489B-4195-9DA8-AE77041366A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ds-780n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36270A93-D2E4-4314-A0E5-F16A8B2A79FF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-10va_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-09-04\",\"matchCriteriaId\":\"2B2CA763-DCE2-4BC0-9630-B46DB9C8921E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-10va:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DE0E8F7-177E-4192-85ED-C584B8247EEC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-30va_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-19\",\"matchCriteriaId\":\"5F6E1C55-B946-4B24-B55A-B3ABA74AED7E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-30va:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1BF1431-A677-4F4B-8316-E9EC8498716C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-707a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-01\",\"matchCriteriaId\":\"A775CF56-EAF6-46F2-BE96-7D4D5E2D3996\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-707a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61BB3AA3-CDDB-44A7-95FF-D12CBC578621\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-708a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-07\",\"matchCriteriaId\":\"401010D8-E5E4-4BE7-86C8-788DA50C6BE8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-708a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A390331E-CD71-400A-8016-C3AD760E4BE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-709a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-12\",\"matchCriteriaId\":\"8AAE9A44-4F14-4C0D-9DFE-0D4930AF1CA2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-709a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD20550-33A6-4135-90F8-D2A090F5D421\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-777a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-01\",\"matchCriteriaId\":\"E7DA43F1-310B-469E-A8FA-C9B892D95EE1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-777a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95F439CB-3A53-4E37-8733-BD536DDB314B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-807ab_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-01\",\"matchCriteriaId\":\"83229C68-3A6E-4E56-B9CB-5E583FCAC443\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-807ab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1297F697-5957-4EA9-A38D-D9A7170BC4A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-807aw_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-01\",\"matchCriteriaId\":\"D9E5EE91-18B1-4DFD-A208-01478605392C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-807aw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71401329-9B3C-41AB-800D-8B96356F8AD5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-807ar_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-01\",\"matchCriteriaId\":\"D2555C06-E04F-4521-925C-9F0A52006204\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-807ar:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18496B97-CE7F-426E-BECD-0FF0C94E12A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-808ab_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-07\",\"matchCriteriaId\":\"EAA2363D-587C-4F3E-B77E-D7A87C5B22CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-808ab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"250EF752-66E8-4BA5-BC91-7485B516CD07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-808aw_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-07\",\"matchCriteriaId\":\"3A46AC7C-DA8B-4020-B1E3-BDBD61E38BA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-808aw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BAE606C-990C-47E8-9A94-3F2398A938F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-808ar_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-07\",\"matchCriteriaId\":\"2A5BA4CA-069F-426D-A858-7C2B6FDAFA59\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-808ar:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"768D52ED-F5E4-438C-8EE5-385CDD20BDB0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-879ab_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-12\",\"matchCriteriaId\":\"35710EC7-FE8E-4C7E-BB29-1BB164FFE82A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-879ab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F169E7BA-4E2E-4651-AF4E-487BF4997FF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-879aw_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-12\",\"matchCriteriaId\":\"4F154A72-E6B2-4CBC-9091-BAD877E85491\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-879aw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BD419CE-E2FC-4B94-8E8E-91BEDADBB4F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-879ar_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-12\",\"matchCriteriaId\":\"6AA02171-2F93-4F57-83BB-F2376421BE76\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-879ar:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0B9CA95-A16B-4A21-AF9F-C3CB571965AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-907f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-01\",\"matchCriteriaId\":\"6697AA35-35EF-42E7-AC4C-7DAB81F551D3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-907f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7D801C2-0AB0-4A60-B191-2FE681E003A9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-977a3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-01\",\"matchCriteriaId\":\"3669AE48-FF0F-4762-AF70-ED3EF7E783E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-977a3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B6E087C-01D7-4A0D-95C2-B4DF4D118F1B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-978a3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-07\",\"matchCriteriaId\":\"EFE8ED05-C494-4DE5-BB67-A84231982542\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-978a3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C988BDD-9189-475C-B203-C139109AEB58\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-979a3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-12\",\"matchCriteriaId\":\"EA1FF85E-527C-4514-89DD-125705181961\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-979a3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DC2CD3-C1F8-4A56-AC74-EBF0E361307D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-m570t_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-09-06\",\"matchCriteriaId\":\"22626AF8-EA5B-4653-A36B-ED42D25F7AF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-m570t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9CA7120-0F70-42F1-964D-5FF77B2617DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ew-m5071ft_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-11-02\",\"matchCriteriaId\":\"FE0DF1EA-F31B-4256-921B-36DC07246679\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ew-m5071ft:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06E26444-5560-4A2D-A0B6-42F2CF4B513C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ew-m660ft_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-04-19\",\"matchCriteriaId\":\"4342A0F1-45FB-4AA6-B1DD-ED7C7DC24EA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ew-m660ft:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16233516-D1F6-4F1B-809F-694F8F50D767\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ew-m770t_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-09-06\",\"matchCriteriaId\":\"5F507ACB-58F1-4490-88C7-DF5D214BFADA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ew-m770t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B69A65C2-1BF3-42D3-B601-175C1807C027\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:pf-70_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-04-20\",\"matchCriteriaId\":\"18B0B5C5-1011-4494-9F85-7B98D8F2155E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:pf-70:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"433BB7EF-B394-4EFD-809C-F969CE198C62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:pf-71_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-07-18\",\"matchCriteriaId\":\"7F572BF4-08D2-4F34-8073-EB84CB4511C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:pf-71:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B276605A-9181-477F-B295-48D09D99472B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:pf-81_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-09-14\",\"matchCriteriaId\":\"06DF2692-B1FD-4DAD-AB29-3C12A1C7A202\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:pf-81:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ACB289E-801F-4B77-87D0-39AB206DFCE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-048a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-07-04\",\"matchCriteriaId\":\"0B6DE709-3A8B-48AD-83CB-FEAC89874B7D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-048a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85BBF56B-A7DA-40C7-95EF-5FE341AB0422\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-049a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-09-11\",\"matchCriteriaId\":\"2F3B6765-7F12-44AE-92E1-511B8F413127\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-049a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5136484-F793-4EF8-BE37-7D70B438A499\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-437a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-07-24\",\"matchCriteriaId\":\"8035F9DD-F45C-4996-9920-7EAC54782F8F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-437a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29F2937E-4F08-4765-B502-EBDB78FD1E04\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m350f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-02-23\",\"matchCriteriaId\":\"F4C1A5D1-6673-4A41-90D6-3796E6D88284\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m350f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B9A0ECF-89CC-4F83-83D5-DB73280B7553\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m5040f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-11-20\",\"matchCriteriaId\":\"98A05D05-F166-4C54-9485-4C72FA0CADC9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m5040f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8123D9F0-5AFB-4BE8-9C3F-B9E04FA4025E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m5041f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-11-20\",\"matchCriteriaId\":\"380061E0-B60B-4917-BDFE-E4B03D275855\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m5041f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"697538F4-2803-4146-B110-10D0208D14EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m650a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-10-17\",\"matchCriteriaId\":\"DBC9C187-1F7B-41CC-B277-BFE58E67CA9D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m650a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A3DE254-BCB7-495F-B2B4-A29A7FDFCB72\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m650f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-10-17\",\"matchCriteriaId\":\"C7922A73-72F2-478C-B280-458715A1EF9E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m650f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85509B44-22A4-4DBA-B80B-4612A423A41F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m680f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-29\",\"matchCriteriaId\":\"B893FE32-26AF-4E19-9DFC-EE491119E3B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m680f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BCC5F18-20B4-4CDC-A864-1359C351C374\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m7050f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-10-13\",\"matchCriteriaId\":\"EDF11770-B243-48EA-8D19-B5D78FACBE5B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m7050f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA1C3A4F-3350-4F5A-86C4-C9C7118BA86C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m7050fp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-10-13\",\"matchCriteriaId\":\"A461F967-9BF6-43D5-993B-8C4E8388EB35\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m7050fp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83E2A379-597D-4816-A23A-A988072C6A53\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m7050fx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-11-07\",\"matchCriteriaId\":\"0A77D819-CEA5-42D0-9C03-CA69186750EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m7050fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AF40258-3D4C-46A8-A316-BA01938BF17A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m7070fx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-04-27\",\"matchCriteriaId\":\"EA82F03D-E08D-44A8-A3D8-09F3736F933F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m7070fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EAE16D1-DAAB-40F9-BAD4-AF1823ADA87A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m740f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-29\",\"matchCriteriaId\":\"828D72F9-77A2-4BA0-9A02-C2BE38EC41B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m740f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9D340A-212B-42F8-8752-7C14B169E594\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m781f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-27\",\"matchCriteriaId\":\"8BD392A1-DBB3-48D3-A44C-357E0EFFAF59\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m781f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7B6B9CC-0812-4917-9766-CDD84A0666F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m840f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-11-16\",\"matchCriteriaId\":\"3CC14918-1C9F-4EC8-ABF8-7D61813AFA92\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m840f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81C22502-8926-423B-9901-46334E1B2EAB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m840fx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-12-08\",\"matchCriteriaId\":\"C2E0D7F3-711B-4F99-A310-B801FA179EFD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m840fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC28AC8E-85DA-4158-8167-17DF69D09011\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m860f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-10-25\",\"matchCriteriaId\":\"51F8F97B-1E66-40A8-B709-80103F37A7E0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m860f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B36A511-6A59-4B1A-AAB0-AA698FD240C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s05b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-03-09\",\"matchCriteriaId\":\"FD48ADCA-3437-4AF5-BF49-D26EDC15F581\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s05b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FD0EE8F-CF0C-45C7-BDBE-CD00D8D39B6D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s05w_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-03-09\",\"matchCriteriaId\":\"DC2AB6EC-900B-4E43-A93A-7A09EC41A816\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s05w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90D992C6-6399-4573-B181-B5E6170A7FFB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s350_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-02-23\",\"matchCriteriaId\":\"BE0E9589-690B-4CA9-8A53-DD29D25FA095\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64B8CAE8-16FE-4712-A360-AFE61B602021\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s5040_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-11-20\",\"matchCriteriaId\":\"09205B5E-CBC3-4AF6-824D-E534F6228ED5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s5040:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9416BADB-FB07-4E5A-B14C-16A65D7F9537\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s7050_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-02-21\",\"matchCriteriaId\":\"AA375B8C-8ADF-4C88-93B7-10041D00E310\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s7050:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AD41CBB-F15B-4A23-B432-8CFF23FD0597\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s7050ps_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-02-21\",\"matchCriteriaId\":\"CB4035F7-6592-4379-B200-07C139C279F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s7050ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"512AF91A-285D-4E31-9688-425CBB0D121E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s7050x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-11-07\",\"matchCriteriaId\":\"D3658F0F-6B2E-4CAB-B010-5D43EFA60C55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s7050x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CEBD057-E928-4387-88D0-028A25BE32F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s7070x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-04-27\",\"matchCriteriaId\":\"D0A84064-58C9-491C-91B3-459FD4218AAD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s7070x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5E04ED4-A885-49FF-906C-340DB15285EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s740_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-12-03\",\"matchCriteriaId\":\"A68DACA7-4082-4E75-95C0-D960EA19B518\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s740:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B63572C3-D000-4342-9807-859C5901CA56\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s840_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-11-16\",\"matchCriteriaId\":\"E4F77FE3-1C8A-4C6A-81BD-9814EFCB7C01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s840:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBE73B65-BC10-4E25-9572-5023113B8B6E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s840x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-12-08\",\"matchCriteriaId\":\"05985298-3F39-46C4-B3DA-625600A59987\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s840x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BB1AC4D-E62E-49A0-8E33-4E4AF3990C63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s860_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-12-07\",\"matchCriteriaId\":\"0DD9018F-914C-43F3-9087-44C9A0B47830\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s860:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27B7576F-A929-4A8A-9618-D815E2F7890B\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/en/jp/JVN89767228/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.epson.jp/support/misc/20181203_oshirase.htm\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jvn.jp/en/jp/JVN89767228/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.epson.jp/support/misc/20181203_oshirase.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…