CVE-2018-0689 (GCVE-0-2018-0689)

Vulnerability from cvelistv5 – Published: 2019-01-09 22:00 – Updated: 2024-08-05 03:35
VLAI?
Summary
HTTP header injection vulnerability in SEIKO EPSON printers and scanners (DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7) may allow a remote attackers to lead a user to a phishing site or execute an arbitrary script on the user's web browser.
Severity ?
No CVSS data available.
CWE
  • HTTP header injection
Assigner
References
Impacted products
Vendor Product Version
SEIKO EPSON CORPORATION SEIKO EPSON printers and scanners Affected: (DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions release ...[truncated*]
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T03:35:48.994Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.epson.jp/support/misc/20181203_oshirase.htm"
          },
          {
            "name": "JVN#89767228",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN89767228/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SEIKO EPSON printers and scanners",
          "vendor": "SEIKO EPSON CORPORATION",
          "versions": [
            {
              "status": "affected",
              "version": "(DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions release ...[truncated*]"
            }
          ]
        }
      ],
      "datePublic": "2019-01-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "HTTP header injection vulnerability in SEIKO EPSON printers and scanners (DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7) may allow a remote attackers to lead a user to a phishing site or execute an arbitrary script on the user\u0027s web browser."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "HTTP header injection",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-01-09T21:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.epson.jp/support/misc/20181203_oshirase.htm"
        },
        {
          "name": "JVN#89767228",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "https://jvn.jp/en/jp/JVN89767228/index.html"
        }
      ],
      "x_ConverterErrors": {
        "version_name": {
          "error": "version_name too long. Use array of versions to record more than one version.",
          "message": "Truncated!"
        }
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2018-0689",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SEIKO EPSON printers and scanners",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "(DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "SEIKO EPSON CORPORATION"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "HTTP header injection vulnerability in SEIKO EPSON printers and scanners (DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7) may allow a remote attackers to lead a user to a phishing site or execute an arbitrary script on the user\u0027s web browser."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "HTTP header injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.epson.jp/support/misc/20181203_oshirase.htm",
              "refsource": "MISC",
              "url": "https://www.epson.jp/support/misc/20181203_oshirase.htm"
            },
            {
              "name": "JVN#89767228",
              "refsource": "JVN",
              "url": "https://jvn.jp/en/jp/JVN89767228/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2018-0689",
    "datePublished": "2019-01-09T22:00:00",
    "dateReserved": "2017-11-27T00:00:00",
    "dateUpdated": "2024-08-05T03:35:48.994Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ds-570w_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-03-13\", \"matchCriteriaId\": \"49AF1989-AAD6-4F13-B2D8-53E9D9BB1261\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ds-570w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68638A6A-8B9B-4BAE-BFF7-E8243DBBC299\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ds-780n_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-03-13\", \"matchCriteriaId\": \"2B6C0113-489B-4195-9DA8-AE77041366A7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ds-780n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36270A93-D2E4-4314-A0E5-F16A8B2A79FF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-10va_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-09-04\", \"matchCriteriaId\": \"2B2CA763-DCE2-4BC0-9630-B46DB9C8921E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-10va:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DE0E8F7-177E-4192-85ED-C584B8247EEC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-30va_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-19\", \"matchCriteriaId\": \"5F6E1C55-B946-4B24-B55A-B3ABA74AED7E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-30va:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1BF1431-A677-4F4B-8316-E9EC8498716C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-707a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-01\", \"matchCriteriaId\": \"A775CF56-EAF6-46F2-BE96-7D4D5E2D3996\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-707a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61BB3AA3-CDDB-44A7-95FF-D12CBC578621\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-708a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-07\", \"matchCriteriaId\": \"401010D8-E5E4-4BE7-86C8-788DA50C6BE8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-708a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A390331E-CD71-400A-8016-C3AD760E4BE1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-709a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-12\", \"matchCriteriaId\": \"8AAE9A44-4F14-4C0D-9DFE-0D4930AF1CA2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-709a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BD20550-33A6-4135-90F8-D2A090F5D421\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-777a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-01\", \"matchCriteriaId\": \"E7DA43F1-310B-469E-A8FA-C9B892D95EE1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-777a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95F439CB-3A53-4E37-8733-BD536DDB314B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-807ab_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-01\", \"matchCriteriaId\": \"83229C68-3A6E-4E56-B9CB-5E583FCAC443\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-807ab:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1297F697-5957-4EA9-A38D-D9A7170BC4A4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-807aw_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-01\", \"matchCriteriaId\": \"D9E5EE91-18B1-4DFD-A208-01478605392C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-807aw:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71401329-9B3C-41AB-800D-8B96356F8AD5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-807ar_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-01\", \"matchCriteriaId\": \"D2555C06-E04F-4521-925C-9F0A52006204\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-807ar:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18496B97-CE7F-426E-BECD-0FF0C94E12A4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-808ab_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-07\", \"matchCriteriaId\": \"EAA2363D-587C-4F3E-B77E-D7A87C5B22CA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-808ab:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"250EF752-66E8-4BA5-BC91-7485B516CD07\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-808aw_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-07\", \"matchCriteriaId\": \"3A46AC7C-DA8B-4020-B1E3-BDBD61E38BA5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-808aw:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BAE606C-990C-47E8-9A94-3F2398A938F9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-808ar_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-07\", \"matchCriteriaId\": \"2A5BA4CA-069F-426D-A858-7C2B6FDAFA59\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-808ar:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"768D52ED-F5E4-438C-8EE5-385CDD20BDB0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-879ab_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-12\", \"matchCriteriaId\": \"35710EC7-FE8E-4C7E-BB29-1BB164FFE82A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-879ab:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F169E7BA-4E2E-4651-AF4E-487BF4997FF1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-879aw_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-12\", \"matchCriteriaId\": \"4F154A72-E6B2-4CBC-9091-BAD877E85491\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-879aw:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BD419CE-E2FC-4B94-8E8E-91BEDADBB4F3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-879ar_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-12\", \"matchCriteriaId\": \"6AA02171-2F93-4F57-83BB-F2376421BE76\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-879ar:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0B9CA95-A16B-4A21-AF9F-C3CB571965AC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-907f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-01\", \"matchCriteriaId\": \"6697AA35-35EF-42E7-AC4C-7DAB81F551D3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-907f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7D801C2-0AB0-4A60-B191-2FE681E003A9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-977a3_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-01\", \"matchCriteriaId\": \"3669AE48-FF0F-4762-AF70-ED3EF7E783E7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-977a3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B6E087C-01D7-4A0D-95C2-B4DF4D118F1B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-978a3_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-08-07\", \"matchCriteriaId\": \"EFE8ED05-C494-4DE5-BB67-A84231982542\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-978a3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C988BDD-9189-475C-B203-C139109AEB58\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-979a3_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-12\", \"matchCriteriaId\": \"EA1FF85E-527C-4514-89DD-125705181961\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-979a3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86DC2CD3-C1F8-4A56-AC74-EBF0E361307D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ep-m570t_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-09-06\", \"matchCriteriaId\": \"22626AF8-EA5B-4653-A36B-ED42D25F7AF6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ep-m570t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9CA7120-0F70-42F1-964D-5FF77B2617DA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ew-m5071ft_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-11-02\", \"matchCriteriaId\": \"FE0DF1EA-F31B-4256-921B-36DC07246679\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ew-m5071ft:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06E26444-5560-4A2D-A0B6-42F2CF4B513C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ew-m660ft_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-04-19\", \"matchCriteriaId\": \"4342A0F1-45FB-4AA6-B1DD-ED7C7DC24EA5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ew-m660ft:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16233516-D1F6-4F1B-809F-694F8F50D767\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:ew-m770t_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-09-06\", \"matchCriteriaId\": \"5F507ACB-58F1-4490-88C7-DF5D214BFADA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:ew-m770t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B69A65C2-1BF3-42D3-B601-175C1807C027\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:pf-70_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-04-20\", \"matchCriteriaId\": \"18B0B5C5-1011-4494-9F85-7B98D8F2155E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:pf-70:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"433BB7EF-B394-4EFD-809C-F969CE198C62\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:pf-71_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-07-18\", \"matchCriteriaId\": \"7F572BF4-08D2-4F34-8073-EB84CB4511C5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:pf-71:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B276605A-9181-477F-B295-48D09D99472B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:pf-81_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-09-14\", \"matchCriteriaId\": \"06DF2692-B1FD-4DAD-AB29-3C12A1C7A202\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:pf-81:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9ACB289E-801F-4B77-87D0-39AB206DFCE1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-048a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-07-04\", \"matchCriteriaId\": \"0B6DE709-3A8B-48AD-83CB-FEAC89874B7D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-048a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85BBF56B-A7DA-40C7-95EF-5FE341AB0422\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-049a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-09-11\", \"matchCriteriaId\": \"2F3B6765-7F12-44AE-92E1-511B8F413127\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-049a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5136484-F793-4EF8-BE37-7D70B438A499\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-437a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-07-24\", \"matchCriteriaId\": \"8035F9DD-F45C-4996-9920-7EAC54782F8F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-437a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29F2937E-4F08-4765-B502-EBDB78FD1E04\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m350f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-02-23\", \"matchCriteriaId\": \"F4C1A5D1-6673-4A41-90D6-3796E6D88284\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m350f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B9A0ECF-89CC-4F83-83D5-DB73280B7553\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m5040f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-11-20\", \"matchCriteriaId\": \"98A05D05-F166-4C54-9485-4C72FA0CADC9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m5040f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8123D9F0-5AFB-4BE8-9C3F-B9E04FA4025E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m5041f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-11-20\", \"matchCriteriaId\": \"380061E0-B60B-4917-BDFE-E4B03D275855\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m5041f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"697538F4-2803-4146-B110-10D0208D14EB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m650a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-10-17\", \"matchCriteriaId\": \"DBC9C187-1F7B-41CC-B277-BFE58E67CA9D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m650a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A3DE254-BCB7-495F-B2B4-A29A7FDFCB72\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m650f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-10-17\", \"matchCriteriaId\": \"C7922A73-72F2-478C-B280-458715A1EF9E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m650f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85509B44-22A4-4DBA-B80B-4612A423A41F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m680f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-29\", \"matchCriteriaId\": \"B893FE32-26AF-4E19-9DFC-EE491119E3B1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m680f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BCC5F18-20B4-4CDC-A864-1359C351C374\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m7050f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-10-13\", \"matchCriteriaId\": \"EDF11770-B243-48EA-8D19-B5D78FACBE5B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m7050f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA1C3A4F-3350-4F5A-86C4-C9C7118BA86C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m7050fp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-10-13\", \"matchCriteriaId\": \"A461F967-9BF6-43D5-993B-8C4E8388EB35\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m7050fp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83E2A379-597D-4816-A23A-A988072C6A53\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m7050fx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-11-07\", \"matchCriteriaId\": \"0A77D819-CEA5-42D0-9C03-CA69186750EA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m7050fx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AF40258-3D4C-46A8-A316-BA01938BF17A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m7070fx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-04-27\", \"matchCriteriaId\": \"EA82F03D-E08D-44A8-A3D8-09F3736F933F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m7070fx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4EAE16D1-DAAB-40F9-BAD4-AF1823ADA87A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m740f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-29\", \"matchCriteriaId\": \"828D72F9-77A2-4BA0-9A02-C2BE38EC41B3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m740f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D9D340A-212B-42F8-8752-7C14B169E594\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m781f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-06-27\", \"matchCriteriaId\": \"8BD392A1-DBB3-48D3-A44C-357E0EFFAF59\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m781f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7B6B9CC-0812-4917-9766-CDD84A0666F2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m840f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-11-16\", \"matchCriteriaId\": \"3CC14918-1C9F-4EC8-ABF8-7D61813AFA92\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m840f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81C22502-8926-423B-9901-46334E1B2EAB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m840fx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-12-08\", \"matchCriteriaId\": \"C2E0D7F3-711B-4F99-A310-B801FA179EFD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m840fx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC28AC8E-85DA-4158-8167-17DF69D09011\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-m860f_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-10-25\", \"matchCriteriaId\": \"51F8F97B-1E66-40A8-B709-80103F37A7E0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-m860f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B36A511-6A59-4B1A-AAB0-AA698FD240C8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s05b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-03-09\", \"matchCriteriaId\": \"FD48ADCA-3437-4AF5-BF49-D26EDC15F581\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s05b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FD0EE8F-CF0C-45C7-BDBE-CD00D8D39B6D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s05w_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-03-09\", \"matchCriteriaId\": \"DC2AB6EC-900B-4E43-A93A-7A09EC41A816\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s05w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90D992C6-6399-4573-B181-B5E6170A7FFB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s350_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-02-23\", \"matchCriteriaId\": \"BE0E9589-690B-4CA9-8A53-DD29D25FA095\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s350:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64B8CAE8-16FE-4712-A360-AFE61B602021\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s5040_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-11-20\", \"matchCriteriaId\": \"09205B5E-CBC3-4AF6-824D-E534F6228ED5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s5040:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9416BADB-FB07-4E5A-B14C-16A65D7F9537\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s7050_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-02-21\", \"matchCriteriaId\": \"AA375B8C-8ADF-4C88-93B7-10041D00E310\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s7050:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AD41CBB-F15B-4A23-B432-8CFF23FD0597\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s7050ps_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-02-21\", \"matchCriteriaId\": \"CB4035F7-6592-4379-B200-07C139C279F3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s7050ps:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"512AF91A-285D-4E31-9688-425CBB0D121E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s7050x_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-11-07\", \"matchCriteriaId\": \"D3658F0F-6B2E-4CAB-B010-5D43EFA60C55\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s7050x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CEBD057-E928-4387-88D0-028A25BE32F0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s7070x_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-04-27\", \"matchCriteriaId\": \"D0A84064-58C9-491C-91B3-459FD4218AAD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s7070x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5E04ED4-A885-49FF-906C-340DB15285EB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s740_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-12-03\", \"matchCriteriaId\": \"A68DACA7-4082-4E75-95C0-D960EA19B518\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s740:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B63572C3-D000-4342-9807-859C5901CA56\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s840_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-11-16\", \"matchCriteriaId\": \"E4F77FE3-1C8A-4C6A-81BD-9814EFCB7C01\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s840:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBE73B65-BC10-4E25-9572-5023113B8B6E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s840x_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-12-08\", \"matchCriteriaId\": \"05985298-3F39-46C4-B3DA-625600A59987\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s840x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BB1AC4D-E62E-49A0-8E33-4E4AF3990C63\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:epson:px-s860_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2017-12-07\", \"matchCriteriaId\": \"0DD9018F-914C-43F3-9087-44C9A0B47830\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:epson:px-s860:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27B7576F-A929-4A8A-9618-D815E2F7890B\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"HTTP header injection vulnerability in SEIKO EPSON printers and scanners (DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7) may allow a remote attackers to lead a user to a phishing site or execute an arbitrary script on the user\u0027s web browser.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de inyecci\\u00f3n de cabeceras HTTP en impresoras y esc\\u00e1neres SEIKO EPSON (DS-570W en versiones de firmware anteriores al 13/03/2018, DS-780N en versiones anteriores al 13/03/2018, EP-10VA en versiones anteriores al 04/09/2017, EP-30VA en versiones anteriores al 19/06/2017, EP-707A firmware en versiones anteriores al 01/08/2017, EP-708A firmware en versiones anteriores al 07/08/2017, EP-709A firmware en versiones anteriores al 12/06/2017, EP-777A en versiones anteriores al 01/08/2017, EP-807AB/AW/AR en versiones anteriores al 01/08/2017, EP-808AB/AW/AR en versiones anteriores al 07/08/2017, EP-879AB/AW/AR en versiones anteriores al 12/06/2017, EP-907F en versiones anteriores al 01/08/2017, EP-977A3 en versiones anteriores al 01/08/2017, EP-978A3 en versiones anteriores al 07/08/2017, EP-979A3 en versiones anteriores al 12/06/2017, EP-M570T en versiones anteriores al 06/09/2017, EW-M5071FT en versiones anteriores al 02/11/2017, EW-M660FT en versiones anteriores al 19/04/2017, EW-M770T en versiones anteriores al 06/09/2017, PF-70 en versiones anteriores al 20/04/2018, PF-71 en versiones anteriores al 18/07/2017, PF-81 en versiones anteriores al 14/09/2017, PX-048A en versiones anteriores al 04/07/2017, PX-049A en versiones anteriores al 11/09/2017, PX-437A en versiones anteriores al 24/07/2017, PX-M350F en versiones anteriores al 23/02/2017, PX-M5040F en versiones anteriores al 20/11/2017, PX-M5041F en versiones anteriores al 20/11/2017, PX-M650A en versiones anteriores al 17/10/2017, PX-M650F en versiones anteriores al 17/10/2017, PX-M680F en versiones anteriores al 29/06/2017, PX-M7050F en versiones anteriores al 13/10/2017, PX-M7050FP en versiones anteriores al 13/10/2017, PX-M7050FX en versiones anteriores al 07/11/2017, PX-M7070FX en versiones anteriores al 27/04/2017, PX-M740F en versiones anteriores al 04/12/2017, PX-M741F en versiones anteriores al 04/12/2017, PX-M780F en versiones anteriores al 29/06/2017, PX-M781F en versiones anteriores al 27/06/2017, PX-M840F en versiones anteriores al 16/11/2017, PX-M840FX en versiones anteriores al 08/12/2017, PX-M860F en versiones anteriores al 25/10/2017, PX-S05B/W en versiones anteriores al 09/03/2018, PX-S350 en versiones anteriores al 23/02/2018, PX-S5040 en versiones anteriores al 20/11/2017, PX-S7050 en versiones anteriores al 21/02/2018, PX-S7050PS en versiones anteriores al 21/02/2018, PX-S7050X en versiones anteriores al 07/11/2017, PX-S7070X en versiones anteriores al 27/04/2017, PX-S740 en versiones anteriores al 03/12/2017, PX-S840 en versiones anteriores al 16/11/2017, PX-S840X en versiones anteriores al 08/12/2017, PX-S860 en versiones anteriores al 07/12/2017) podr\\u00eda permitir que atacantes remotos conduzcan a un usuario a un sitio de phishing o ejecuten un script arbitrario en el navegador web del usuario.\"}]",
      "id": "CVE-2018-0689",
      "lastModified": "2024-11-21T03:38:44.997",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2019-01-09T23:29:01.997",
      "references": "[{\"url\": \"https://jvn.jp/en/jp/JVN89767228/index.html\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.epson.jp/support/misc/20181203_oshirase.htm\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://jvn.jp/en/jp/JVN89767228/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.epson.jp/support/misc/20181203_oshirase.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "vultures@jpcert.or.jp",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-113\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2018-0689\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2019-01-09T23:29:01.997\",\"lastModified\":\"2024-11-21T03:38:44.997\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"HTTP header injection vulnerability in SEIKO EPSON printers and scanners (DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7) may allow a remote attackers to lead a user to a phishing site or execute an arbitrary script on the user\u0027s web browser.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de inyecci\u00f3n de cabeceras HTTP en impresoras y esc\u00e1neres SEIKO EPSON (DS-570W en versiones de firmware anteriores al 13/03/2018, DS-780N en versiones anteriores al 13/03/2018, EP-10VA en versiones anteriores al 04/09/2017, EP-30VA en versiones anteriores al 19/06/2017, EP-707A firmware en versiones anteriores al 01/08/2017, EP-708A firmware en versiones anteriores al 07/08/2017, EP-709A firmware en versiones anteriores al 12/06/2017, EP-777A en versiones anteriores al 01/08/2017, EP-807AB/AW/AR en versiones anteriores al 01/08/2017, EP-808AB/AW/AR en versiones anteriores al 07/08/2017, EP-879AB/AW/AR en versiones anteriores al 12/06/2017, EP-907F en versiones anteriores al 01/08/2017, EP-977A3 en versiones anteriores al 01/08/2017, EP-978A3 en versiones anteriores al 07/08/2017, EP-979A3 en versiones anteriores al 12/06/2017, EP-M570T en versiones anteriores al 06/09/2017, EW-M5071FT en versiones anteriores al 02/11/2017, EW-M660FT en versiones anteriores al 19/04/2017, EW-M770T en versiones anteriores al 06/09/2017, PF-70 en versiones anteriores al 20/04/2018, PF-71 en versiones anteriores al 18/07/2017, PF-81 en versiones anteriores al 14/09/2017, PX-048A en versiones anteriores al 04/07/2017, PX-049A en versiones anteriores al 11/09/2017, PX-437A en versiones anteriores al 24/07/2017, PX-M350F en versiones anteriores al 23/02/2017, PX-M5040F en versiones anteriores al 20/11/2017, PX-M5041F en versiones anteriores al 20/11/2017, PX-M650A en versiones anteriores al 17/10/2017, PX-M650F en versiones anteriores al 17/10/2017, PX-M680F en versiones anteriores al 29/06/2017, PX-M7050F en versiones anteriores al 13/10/2017, PX-M7050FP en versiones anteriores al 13/10/2017, PX-M7050FX en versiones anteriores al 07/11/2017, PX-M7070FX en versiones anteriores al 27/04/2017, PX-M740F en versiones anteriores al 04/12/2017, PX-M741F en versiones anteriores al 04/12/2017, PX-M780F en versiones anteriores al 29/06/2017, PX-M781F en versiones anteriores al 27/06/2017, PX-M840F en versiones anteriores al 16/11/2017, PX-M840FX en versiones anteriores al 08/12/2017, PX-M860F en versiones anteriores al 25/10/2017, PX-S05B/W en versiones anteriores al 09/03/2018, PX-S350 en versiones anteriores al 23/02/2018, PX-S5040 en versiones anteriores al 20/11/2017, PX-S7050 en versiones anteriores al 21/02/2018, PX-S7050PS en versiones anteriores al 21/02/2018, PX-S7050X en versiones anteriores al 07/11/2017, PX-S7070X en versiones anteriores al 27/04/2017, PX-S740 en versiones anteriores al 03/12/2017, PX-S840 en versiones anteriores al 16/11/2017, PX-S840X en versiones anteriores al 08/12/2017, PX-S860 en versiones anteriores al 07/12/2017) podr\u00eda permitir que atacantes remotos conduzcan a un usuario a un sitio de phishing o ejecuten un script arbitrario en el navegador web del usuario.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-113\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ds-570w_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-03-13\",\"matchCriteriaId\":\"49AF1989-AAD6-4F13-B2D8-53E9D9BB1261\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ds-570w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68638A6A-8B9B-4BAE-BFF7-E8243DBBC299\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ds-780n_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-03-13\",\"matchCriteriaId\":\"2B6C0113-489B-4195-9DA8-AE77041366A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ds-780n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36270A93-D2E4-4314-A0E5-F16A8B2A79FF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-10va_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-09-04\",\"matchCriteriaId\":\"2B2CA763-DCE2-4BC0-9630-B46DB9C8921E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-10va:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DE0E8F7-177E-4192-85ED-C584B8247EEC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-30va_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-19\",\"matchCriteriaId\":\"5F6E1C55-B946-4B24-B55A-B3ABA74AED7E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-30va:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1BF1431-A677-4F4B-8316-E9EC8498716C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-707a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-01\",\"matchCriteriaId\":\"A775CF56-EAF6-46F2-BE96-7D4D5E2D3996\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-707a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61BB3AA3-CDDB-44A7-95FF-D12CBC578621\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-708a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-07\",\"matchCriteriaId\":\"401010D8-E5E4-4BE7-86C8-788DA50C6BE8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-708a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A390331E-CD71-400A-8016-C3AD760E4BE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-709a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-12\",\"matchCriteriaId\":\"8AAE9A44-4F14-4C0D-9DFE-0D4930AF1CA2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-709a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD20550-33A6-4135-90F8-D2A090F5D421\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-777a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-01\",\"matchCriteriaId\":\"E7DA43F1-310B-469E-A8FA-C9B892D95EE1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-777a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95F439CB-3A53-4E37-8733-BD536DDB314B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-807ab_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-01\",\"matchCriteriaId\":\"83229C68-3A6E-4E56-B9CB-5E583FCAC443\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-807ab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1297F697-5957-4EA9-A38D-D9A7170BC4A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-807aw_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-01\",\"matchCriteriaId\":\"D9E5EE91-18B1-4DFD-A208-01478605392C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-807aw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71401329-9B3C-41AB-800D-8B96356F8AD5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-807ar_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-01\",\"matchCriteriaId\":\"D2555C06-E04F-4521-925C-9F0A52006204\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-807ar:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18496B97-CE7F-426E-BECD-0FF0C94E12A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-808ab_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-07\",\"matchCriteriaId\":\"EAA2363D-587C-4F3E-B77E-D7A87C5B22CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-808ab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"250EF752-66E8-4BA5-BC91-7485B516CD07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-808aw_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-07\",\"matchCriteriaId\":\"3A46AC7C-DA8B-4020-B1E3-BDBD61E38BA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-808aw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BAE606C-990C-47E8-9A94-3F2398A938F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-808ar_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-07\",\"matchCriteriaId\":\"2A5BA4CA-069F-426D-A858-7C2B6FDAFA59\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-808ar:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"768D52ED-F5E4-438C-8EE5-385CDD20BDB0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-879ab_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-12\",\"matchCriteriaId\":\"35710EC7-FE8E-4C7E-BB29-1BB164FFE82A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-879ab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F169E7BA-4E2E-4651-AF4E-487BF4997FF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-879aw_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-12\",\"matchCriteriaId\":\"4F154A72-E6B2-4CBC-9091-BAD877E85491\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-879aw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BD419CE-E2FC-4B94-8E8E-91BEDADBB4F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-879ar_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-12\",\"matchCriteriaId\":\"6AA02171-2F93-4F57-83BB-F2376421BE76\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-879ar:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0B9CA95-A16B-4A21-AF9F-C3CB571965AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-907f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-01\",\"matchCriteriaId\":\"6697AA35-35EF-42E7-AC4C-7DAB81F551D3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-907f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7D801C2-0AB0-4A60-B191-2FE681E003A9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-977a3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-01\",\"matchCriteriaId\":\"3669AE48-FF0F-4762-AF70-ED3EF7E783E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-977a3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B6E087C-01D7-4A0D-95C2-B4DF4D118F1B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-978a3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-08-07\",\"matchCriteriaId\":\"EFE8ED05-C494-4DE5-BB67-A84231982542\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-978a3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C988BDD-9189-475C-B203-C139109AEB58\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-979a3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-12\",\"matchCriteriaId\":\"EA1FF85E-527C-4514-89DD-125705181961\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-979a3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DC2CD3-C1F8-4A56-AC74-EBF0E361307D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ep-m570t_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-09-06\",\"matchCriteriaId\":\"22626AF8-EA5B-4653-A36B-ED42D25F7AF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ep-m570t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9CA7120-0F70-42F1-964D-5FF77B2617DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ew-m5071ft_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-11-02\",\"matchCriteriaId\":\"FE0DF1EA-F31B-4256-921B-36DC07246679\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ew-m5071ft:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06E26444-5560-4A2D-A0B6-42F2CF4B513C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ew-m660ft_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-04-19\",\"matchCriteriaId\":\"4342A0F1-45FB-4AA6-B1DD-ED7C7DC24EA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ew-m660ft:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16233516-D1F6-4F1B-809F-694F8F50D767\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:ew-m770t_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-09-06\",\"matchCriteriaId\":\"5F507ACB-58F1-4490-88C7-DF5D214BFADA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:ew-m770t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B69A65C2-1BF3-42D3-B601-175C1807C027\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:pf-70_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-04-20\",\"matchCriteriaId\":\"18B0B5C5-1011-4494-9F85-7B98D8F2155E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:pf-70:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"433BB7EF-B394-4EFD-809C-F969CE198C62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:pf-71_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-07-18\",\"matchCriteriaId\":\"7F572BF4-08D2-4F34-8073-EB84CB4511C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:pf-71:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B276605A-9181-477F-B295-48D09D99472B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:pf-81_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-09-14\",\"matchCriteriaId\":\"06DF2692-B1FD-4DAD-AB29-3C12A1C7A202\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:pf-81:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ACB289E-801F-4B77-87D0-39AB206DFCE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-048a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-07-04\",\"matchCriteriaId\":\"0B6DE709-3A8B-48AD-83CB-FEAC89874B7D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-048a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85BBF56B-A7DA-40C7-95EF-5FE341AB0422\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-049a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-09-11\",\"matchCriteriaId\":\"2F3B6765-7F12-44AE-92E1-511B8F413127\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-049a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5136484-F793-4EF8-BE37-7D70B438A499\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-437a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-07-24\",\"matchCriteriaId\":\"8035F9DD-F45C-4996-9920-7EAC54782F8F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-437a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29F2937E-4F08-4765-B502-EBDB78FD1E04\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m350f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-02-23\",\"matchCriteriaId\":\"F4C1A5D1-6673-4A41-90D6-3796E6D88284\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m350f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B9A0ECF-89CC-4F83-83D5-DB73280B7553\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m5040f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-11-20\",\"matchCriteriaId\":\"98A05D05-F166-4C54-9485-4C72FA0CADC9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m5040f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8123D9F0-5AFB-4BE8-9C3F-B9E04FA4025E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m5041f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-11-20\",\"matchCriteriaId\":\"380061E0-B60B-4917-BDFE-E4B03D275855\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m5041f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"697538F4-2803-4146-B110-10D0208D14EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m650a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-10-17\",\"matchCriteriaId\":\"DBC9C187-1F7B-41CC-B277-BFE58E67CA9D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m650a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A3DE254-BCB7-495F-B2B4-A29A7FDFCB72\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m650f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-10-17\",\"matchCriteriaId\":\"C7922A73-72F2-478C-B280-458715A1EF9E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m650f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85509B44-22A4-4DBA-B80B-4612A423A41F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m680f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-29\",\"matchCriteriaId\":\"B893FE32-26AF-4E19-9DFC-EE491119E3B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m680f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BCC5F18-20B4-4CDC-A864-1359C351C374\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m7050f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-10-13\",\"matchCriteriaId\":\"EDF11770-B243-48EA-8D19-B5D78FACBE5B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m7050f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA1C3A4F-3350-4F5A-86C4-C9C7118BA86C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m7050fp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-10-13\",\"matchCriteriaId\":\"A461F967-9BF6-43D5-993B-8C4E8388EB35\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m7050fp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83E2A379-597D-4816-A23A-A988072C6A53\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m7050fx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-11-07\",\"matchCriteriaId\":\"0A77D819-CEA5-42D0-9C03-CA69186750EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m7050fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AF40258-3D4C-46A8-A316-BA01938BF17A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m7070fx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-04-27\",\"matchCriteriaId\":\"EA82F03D-E08D-44A8-A3D8-09F3736F933F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m7070fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EAE16D1-DAAB-40F9-BAD4-AF1823ADA87A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m740f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-29\",\"matchCriteriaId\":\"828D72F9-77A2-4BA0-9A02-C2BE38EC41B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m740f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9D340A-212B-42F8-8752-7C14B169E594\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m781f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-06-27\",\"matchCriteriaId\":\"8BD392A1-DBB3-48D3-A44C-357E0EFFAF59\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m781f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7B6B9CC-0812-4917-9766-CDD84A0666F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m840f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-11-16\",\"matchCriteriaId\":\"3CC14918-1C9F-4EC8-ABF8-7D61813AFA92\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m840f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81C22502-8926-423B-9901-46334E1B2EAB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m840fx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-12-08\",\"matchCriteriaId\":\"C2E0D7F3-711B-4F99-A310-B801FA179EFD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m840fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC28AC8E-85DA-4158-8167-17DF69D09011\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-m860f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-10-25\",\"matchCriteriaId\":\"51F8F97B-1E66-40A8-B709-80103F37A7E0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-m860f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B36A511-6A59-4B1A-AAB0-AA698FD240C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s05b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-03-09\",\"matchCriteriaId\":\"FD48ADCA-3437-4AF5-BF49-D26EDC15F581\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s05b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FD0EE8F-CF0C-45C7-BDBE-CD00D8D39B6D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s05w_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-03-09\",\"matchCriteriaId\":\"DC2AB6EC-900B-4E43-A93A-7A09EC41A816\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s05w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90D992C6-6399-4573-B181-B5E6170A7FFB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s350_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-02-23\",\"matchCriteriaId\":\"BE0E9589-690B-4CA9-8A53-DD29D25FA095\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64B8CAE8-16FE-4712-A360-AFE61B602021\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s5040_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-11-20\",\"matchCriteriaId\":\"09205B5E-CBC3-4AF6-824D-E534F6228ED5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s5040:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9416BADB-FB07-4E5A-B14C-16A65D7F9537\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s7050_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-02-21\",\"matchCriteriaId\":\"AA375B8C-8ADF-4C88-93B7-10041D00E310\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s7050:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AD41CBB-F15B-4A23-B432-8CFF23FD0597\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s7050ps_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-02-21\",\"matchCriteriaId\":\"CB4035F7-6592-4379-B200-07C139C279F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s7050ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"512AF91A-285D-4E31-9688-425CBB0D121E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s7050x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-11-07\",\"matchCriteriaId\":\"D3658F0F-6B2E-4CAB-B010-5D43EFA60C55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s7050x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CEBD057-E928-4387-88D0-028A25BE32F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s7070x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-04-27\",\"matchCriteriaId\":\"D0A84064-58C9-491C-91B3-459FD4218AAD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s7070x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5E04ED4-A885-49FF-906C-340DB15285EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s740_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-12-03\",\"matchCriteriaId\":\"A68DACA7-4082-4E75-95C0-D960EA19B518\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s740:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B63572C3-D000-4342-9807-859C5901CA56\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s840_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-11-16\",\"matchCriteriaId\":\"E4F77FE3-1C8A-4C6A-81BD-9814EFCB7C01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s840:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBE73B65-BC10-4E25-9572-5023113B8B6E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s840x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-12-08\",\"matchCriteriaId\":\"05985298-3F39-46C4-B3DA-625600A59987\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s840x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BB1AC4D-E62E-49A0-8E33-4E4AF3990C63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:epson:px-s860_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2017-12-07\",\"matchCriteriaId\":\"0DD9018F-914C-43F3-9087-44C9A0B47830\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:epson:px-s860:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27B7576F-A929-4A8A-9618-D815E2F7890B\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/en/jp/JVN89767228/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.epson.jp/support/misc/20181203_oshirase.htm\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jvn.jp/en/jp/JVN89767228/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.epson.jp/support/misc/20181203_oshirase.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…