4972 lines
470 KiB
Text
4972 lines
470 KiB
Text
<!DOCTYPE html>
|
||
|
||
<html lang="en">
|
||
<head>
|
||
|
||
|
||
|
||
<title>NVD - CVE-2023-4929</title>
|
||
|
||
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
|
||
<meta http-equiv="content-style-type" content="text/css" />
|
||
<meta http-equiv="content-script-type" content="text/javascript" />
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||
|
||
|
||
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link
|
||
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
|
||
|
||
<link href="/site-media/css/nist-fonts.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/base-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/media-resize.css" type="text/css"
|
||
rel="stylesheet" />
|
||
|
||
|
||
<meta name="theme-color" content="#000000">
|
||
|
||
|
||
<script src="/site-scripts/jquery/dist/jquery.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/underscore/underscore-min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/bootstrap/js/bootstrap.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/moment/min/moment.min.js"
|
||
type="text/javascript"></script>
|
||
<script
|
||
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
|
||
type="text/javascript"></script>
|
||
|
||
|
||
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
|
||
<script src="/site-media/js/nist-exit-script.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/forms.js" type="text/javascript"></script>
|
||
|
||
<script
|
||
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true"
|
||
type="text/javascript" id="_fed_an_js_tag"></script>
|
||
|
||
<!-- Google tag (gtag.js) -->
|
||
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
|
||
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
|
||
|
||
|
||
<style id="antiClickjack">
|
||
body>* {
|
||
display: none !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: block !important;
|
||
}
|
||
</style>
|
||
<noscript>
|
||
<style id="antiClickjackNoScript">
|
||
body>* {
|
||
display: block !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: none !important;
|
||
}
|
||
</style>
|
||
</noscript>
|
||
<script type="text/javascript" id="antiClickjackScript">
|
||
if (self === top) {
|
||
// no clickjacking
|
||
var antiClickjack = document.getElementById("antiClickjack");
|
||
antiClickjack.parentNode.removeChild(antiClickjack);
|
||
} else {
|
||
setTimeout(tryForward(), 5000);
|
||
}
|
||
|
||
function tryForward() {
|
||
top.location = self.location;
|
||
}
|
||
</script>
|
||
<meta charset="UTF-8">
|
||
|
||
<link href="/site-media/css/nvd-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/images/favicons/apple-touch-icon.png"
|
||
rel="apple-touch-icon" type="image/png" sizes="180x180" />
|
||
<link href="/site-media/images/favicons/favicon-32x32.png"
|
||
rel="icon" type="image/png" sizes="32x32" />
|
||
<link href="/site-media/images/favicons/favicon-16x16.png"
|
||
rel="icon" type="image/png" sizes="16x16" />
|
||
<link href="/site-media/images/favicons/manifest.json"
|
||
rel="manifest" />
|
||
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
|
||
rel="mask-icon" color="#000000" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" />
|
||
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" type="image/x-icon" />
|
||
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
|
||
type="image/x-icon" />
|
||
<meta charset="UTF-8">
|
||
<script src="/site-media/js/vulnerability/vulnDetail.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
|
||
type="text/javascript"></script>
|
||
|
||
</head>
|
||
<body>
|
||
<header role="banner" title="Site Banner">
|
||
<div id="antiClickjack" style="display: none">
|
||
<h1>You are viewing this page in an unauthorized frame window.</h1>
|
||
<p>
|
||
This is a potential security issue, you are being redirected to
|
||
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
|
||
</p>
|
||
</div>
|
||
<div>
|
||
<section class="usa-banner" aria-label="Official government website">
|
||
<div class="usa-accordion container">
|
||
<header class="usa-banner__header">
|
||
<noscript>
|
||
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
|
||
</noscript>
|
||
<img class="usa-banner__header-flag"
|
||
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
|
||
|
||
<span class="usa-banner__header-text">An official website of the United States government</span>
|
||
|
||
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
|
||
<span class="usa-banner__button-text">Here's how you know</span>
|
||
</button>
|
||
</header>
|
||
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
|
||
<div class="row">
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Official websites use .gov</strong>
|
||
<br>
|
||
A <strong>.gov</strong> website belongs to an official government organization in the United States.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Secure .gov websites use HTTPS</strong>
|
||
<br>
|
||
A <strong>lock</strong> (<img class="usa-banner__lock"
|
||
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
</div>
|
||
<div>
|
||
<div>
|
||
<nav id="navbar" class="navbar">
|
||
<div id="nist-menu-container" class="container">
|
||
<div class="row">
|
||
<!-- Brand -->
|
||
<div class="col-xs-6 col-md-4 navbar-header"
|
||
style="height:104px">
|
||
<a class="navbar-brand"
|
||
href="https://www.nist.gov"
|
||
target="_blank" rel="noopener noreferrer"
|
||
id="navbar-brand-image"
|
||
style="padding-top: 36px">
|
||
|
||
<img alt="National Institute of Standards and Technology"
|
||
src="/site-media/images/nist/nist-logo.svg"
|
||
width="110" height="30">
|
||
</a>
|
||
</div>
|
||
<div class="col-xs-6 col-md-8 navbar-nist-logo">
|
||
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
|
||
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
|
||
class="hidden-xxs">NVD </span>MENU</span>
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="main-menu-row container">
|
||
<!-- Collect the nav links, forms, and other content for toggling -->
|
||
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
|
||
<ul>
|
||
|
||
<li><a href="/general"> General <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-general"
|
||
data-expander-name="general" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="general">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/nvd-dashboard">NVD Dashboard</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/faq">FAQ</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/visualizations">Visualizations</a>
|
||
</p>
|
||
<p>
|
||
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln"> Vulnerabilities <span
|
||
class="expander fa fa-plus"
|
||
id="nvd-header-menu-vulnerabilities"
|
||
data-expander-name="vulnerabilities" data-expanded="false">
|
||
<span class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="vulnerabilities">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Search & Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/categories">Weakness Types</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/vendor-comments">Vendor Comments</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/cvmap">CVMAP</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-metrics"
|
||
data-expander-name="metrics" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="metrics">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
|
||
Calculator</a>
|
||
</p>
|
||
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/products"> Products <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-products"
|
||
data-expander-name="products" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="products">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe">CPE Dictionary</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/statistics">CPE Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/swid">SWID</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4"></div>
|
||
</div>
|
||
</div></li>
|
||
<li>
|
||
<a href="/developers">Developers<span
|
||
class="expander fa fa-plus" id="nvd-header-menu-developers"
|
||
data-expander-name="developers" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="developers">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/start-here">Start Here</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/request-an-api-key">Request an API Key</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/vulnerabilities">Vulnerabilities</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/products">Products</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/data-sources">Data Sources</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/terms-of-use">Terms of Use</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</li>
|
||
<li><a href="/contact"> Contact NVD </a></li>
|
||
<li><a href="/other"> Other Sites <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-othersites"
|
||
data-expander-name="otherSites" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="otherSites">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
|
||
Validated Tools</a>
|
||
</p>
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
<li><a href="/search"> Search <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-search"
|
||
data-expander-name="search" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="search">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Vulnerability Search</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
|
||
|
||
|
||
</ul>
|
||
</div>
|
||
<!-- /#mobile-nav-container -->
|
||
</div>
|
||
|
||
</nav>
|
||
<section id="itl-header" class="has-menu">
|
||
<div class="container">
|
||
<div class="row">
|
||
<div class="col-sm-12 col-md-8">
|
||
<h2 class="hidden-xs hidden-sm">
|
||
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
|
||
</h2>
|
||
<h1 class="hidden-xs hidden-sm">
|
||
<a id="nvd-header-link"
|
||
href="/">National Vulnerability Database</a>
|
||
</h1>
|
||
<h1 class="hidden-xs text-center hidden-md hidden-lg"
|
||
>National Vulnerability Database</h1>
|
||
<h1 class="hidden-sm hidden-md hidden-lg text-center"
|
||
>NVD</h1>
|
||
|
||
</div>
|
||
<div class="col-sm-12 col-md-4">
|
||
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
|
||
<img id="img-logo-nvd-lg"
|
||
alt="National Vulnerability Database"
|
||
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
|
||
width="500" height="100">
|
||
</a>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
|
||
|
||
</div>
|
||
</div>
|
||
</header>
|
||
<main>
|
||
<div>
|
||
<div id="body-section" class="container">
|
||
<div class="row">
|
||
<ol class="breadcrumb">
|
||
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
|
||
</ol>
|
||
</div>
|
||
<div>
|
||
<style>
|
||
/* wrap the words for CVSS v4 */
|
||
#nistv4Metric {
|
||
word-wrap: break-word;
|
||
}
|
||
</style>
|
||
|
||
<script>
|
||
/*<![CDATA[*/
|
||
var vuln = {
|
||
nistV4Present: false,
|
||
cnaV4Present: false,
|
||
nistV3Present: true,
|
||
cnaV3Present: true,
|
||
nistV2Present: false,
|
||
cnaV2Present: false
|
||
};
|
||
/*]]>*/
|
||
</script>
|
||
|
||
|
||
<div>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
|
||
<div id="vulnDetailPanel">
|
||
<table id="vulnDetailTableView" style="border-collapse: collapse;">
|
||
<tr>
|
||
<td colspan="2">
|
||
|
||
<h2 data-testid="page-header">
|
||
<i class="fa fa-bug fa-flip-vertical"></i><span
|
||
data-testid="page-header-vuln-id">CVE-2023-4929</span>
|
||
Detail
|
||
</h2>
|
||
|
||
|
||
|
||
<div class="row">
|
||
<div class="col-lg-9 col-md-7 col-sm-12">
|
||
<div id="vulnShowWarningDiv"
|
||
data-testid="vuln-warning-container">
|
||
<div
|
||
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
|
||
<strong class="h4Size"><span
|
||
data-testid="vuln-warning-status-name">Modified</span></strong>
|
||
<hr/>
|
||
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
|
||
</div>
|
||
</div>
|
||
|
||
<h3 id="vulnDescriptionTitle"
|
||
data-testid="vuln-description-title">Description </h3>
|
||
|
||
<p data-testid="vuln-description">All firmware versions of the NPort 5000 Series are affected by an improper validation of integrity check vulnerability. This vulnerability results from insufficient checks on firmware updates or upgrades, potentially allowing malicious users to manipulate the firmware and gain control of devices.
|
||
|
||
</p><br/>
|
||
|
||
|
||
|
||
|
||
|
||
<!-- CVSS Severity and Vector Strings -->
|
||
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
|
||
class="row bs-callout bs-callout-success cvssVulnDetail">
|
||
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
|
||
 
|
||
<div id="cvssVulnDetailBtn" class="btn-group">
|
||
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 4.0
|
||
</button>
|
||
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 3.x
|
||
</button>
|
||
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 2.0
|
||
</button>
|
||
</div>
|
||
|
||
|
||
<div id="cvssEnrichmentNotes">
|
||
<i>
|
||
<small>
|
||
NVD enrichment efforts reference publicly available information to associate
|
||
vector strings. CVSS information contributed by other sources is also
|
||
displayed.
|
||
</small>
|
||
</i>
|
||
</div>
|
||
|
||
<!-- CVSS v4.0 -->
|
||
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
|
||
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss4-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong> </strong><span
|
||
class="severityDetail"> <a
|
||
id="Cvss4NistCalculatorAnchorNA"
|
||
class="label label-default"
|
||
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
|
||
<span> <span
|
||
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV4MetricHidden"
|
||
value=""/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
<!-- CVSS V3.x -->
|
||
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 3.x Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3NistCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2023-4929&vector=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||
data-testid="vuln-cvss3-panel-score"
|
||
class="label label-danger">8.8 HIGH</a>
|
||
</span></span>
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss3-nist-vector"
|
||
class="tooltipCvss3NistMetrics">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span></span>
|
||
<input type="hidden"
|
||
id="nistV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>8.8 </span><span data-testid='vuln-cvssv3-base-score-severity'>HIGH</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 5.9 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 2.8 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Network </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> Low </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> Low </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Unchanged </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> High </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> High </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> High </span> </p> </span> "/>
|
||
|
||
</div>
|
||
|
||
|
||
</div>
|
||
<!-- CNA -->
|
||
<div class="row no-gutters">
|
||
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div id="v3CnaIconReference">
|
||
<img src="/site-media/images/NVD_Reference_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="Nist CVSS score does not match with CNA score">
|
||
|
||
</div>
|
||
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>CNA:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-cna">Moxa Inc.</span>
|
||
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3CnaCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2023-4929&vector=AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H&version=3.1&source=Moxa%20Inc."
|
||
data-testid="vuln-cvss3-cna-panel-score"
|
||
class="label label-warning">6.5 MEDIUM</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong> <span
|
||
data-testid="vuln-cvss3-cna-vector"
|
||
class="tooltipCvss3CnaMetrics">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H</span></span>
|
||
<input type="hidden" id="cnaV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>6.5 </span><span data-testid='vuln-cvssv3-base-score-severity'>MEDIUM</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 5.2 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 1.2 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Network </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> Low </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> High </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Unchanged </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> None </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> High </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> High </span> </p> </span> "/>
|
||
</div>
|
||
</div>
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
|
||
<!-- CVSS V2.0 -->
|
||
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="National Institute of Standards and Technology">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span
|
||
data-testid="vuln-cvss2-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"><a
|
||
id="Cvss2CalculatorAnchorNA" class="label label-default"
|
||
data-testid="vuln-cvss2-panel-score-na"
|
||
href=''>N/A</a></span></span>
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><span
|
||
data-testid="vuln-cvss2-panel-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV2MetricHidden"
|
||
value=""/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="row col-sm-12">
|
||
|
||
|
||
|
||
<div id="vulnHyperlinksPanel">
|
||
<h3>References to Advisories, Solutions, and Tools</h3>
|
||
<p>
|
||
By selecting these links, you will be leaving NIST webspace.
|
||
We have provided these links to other web sites because they
|
||
may have information that would be of interest to you. No
|
||
inferences should be drawn on account of other sites being
|
||
referenced, or not, from this page. There may be other web
|
||
sites that are more appropriate for your purpose. NIST does
|
||
not necessarily endorse the views expressed, or concur with
|
||
the facts presented on these sites. Further, NIST does not
|
||
endorse any commercial products that may be mentioned on
|
||
these sites. Please address comments about this page to <a
|
||
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
|
||
</p>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-hyperlinks-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Hyperlink</th>
|
||
<th>Resource</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-0">
|
||
<td data-testid="vuln-hyperlinks-link-0">
|
||
<a
|
||
href="https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability"
|
||
target="_blank" rel="noopener noreferrer">https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-0">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-1">
|
||
<td data-testid="vuln-hyperlinks-link-1">
|
||
<a
|
||
href="https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability"
|
||
target="_blank" rel="noopener noreferrer">https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-1">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
|
||
data-testid="vuln-technical-details-container">
|
||
<h3>Weakness Enumeration</h3>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-CWEs-table">
|
||
<thead>
|
||
<tr>
|
||
<th>CWE-ID</th>
|
||
<th>CWE Name</th>
|
||
<th>Source</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-CWEs-row-0">
|
||
<td data-testid="vuln-CWEs-link-0">
|
||
<a href="http://cwe.mitre.org/data/definitions/354.html" target="_blank" rel="noopener noreferrer">CWE-354</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-0">Improper Validation of Integrity Check Value</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-0">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
|
||
>
|
||
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cweNvdIcon"
|
||
alt="cwe source acceptance level">
|
||
|
||
<span>NIST </span>
|
||
</span><span class="cweSource" data-testid="vuln-cwes-assigner-0-1"
|
||
>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
<span>Moxa Inc. </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
</div>
|
||
|
||
|
||
<div>
|
||
<h3>
|
||
Known Affected Software Configurations <small> <a
|
||
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
|
||
to CPE 2.2</a></small>
|
||
</h3>
|
||
<span id="vulnConfigurationsArea"></span>
|
||
<input type="hidden" id="cveIdHidden" value="CVE-2023-4929"/>
|
||
|
||
<div>
|
||
|
||
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
|
||
<div id="vulnCpeTree" style="display: none;"></div>
|
||
<input type="hidden"
|
||
id="InputRestBasePath"
|
||
value="/rest/public">
|
||
<input type="hidden" id="cveTreeJsonDataHidden" value="[{"id":1,"dataTestId":"vuln-software-config-1","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-1-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-1-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5150ai-m12-ct-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5150ai-m12-ct-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5150ai-m12-ct-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-0-0","id":"15966150","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"611651","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-1-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5150ai-m12-ct-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5150ai-m12-ct-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5150ai-m12-ct-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-0","id":"15966149","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":2,"dataTestId":"vuln-software-config-2","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-2-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5250ai-m12-ct-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5250ai-m12-ct-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5250ai-m12-ct-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-0","id":"15966148","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"611653","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5250ai-m12-ct-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5250ai-m12-ct-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5250ai-m12-ct-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-0","id":"15966147","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":3,"dataTestId":"vuln-software-config-3","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-3-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5150ai-m12-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5150ai-m12-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5150ai-m12-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-0","id":"15966146","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"611655","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5150ai-m12-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5150ai-m12-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5150ai-m12-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-0","id":"15966145","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":4,"dataTestId":"vuln-software-config-4","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-4-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-4-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5250ai-m12-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5250ai-m12-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5250ai-m12-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-0-0","id":"15966144","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"611657","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-4-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5250ai-m12-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5250ai-m12-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5250ai-m12-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-0","id":"15966143","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":5,"dataTestId":"vuln-software-config-5","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-5-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5450ai-m12-ct-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5450ai-m12-ct-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5450ai-m12-ct-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-0","id":"15966142","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"611659","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5450ai-m12-ct-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5450ai-m12-ct-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5450ai-m12-ct-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-0","id":"15966141","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":6,"dataTestId":"vuln-software-config-6","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-6-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-6-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5150ai-m12_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5150ai-m12_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5150ai-m12_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-0-0","id":"15966140","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"611661","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-6-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5150ai-m12%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5150ai-m12:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5150ai-m12:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-1-0","id":"15966139","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":7,"dataTestId":"vuln-software-config-7","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-7-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-7-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5250ai-m12_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5250ai-m12_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5250ai-m12_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-7-0-0-0","id":"15966096","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"611663","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-7-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5250ai-m12%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5250ai-m12:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5250ai-m12:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-7-0-1-0","id":"15966097","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":8,"dataTestId":"vuln-software-config-8","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-8-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-8-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5150ai-m12-ct_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5150ai-m12-ct_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5150ai-m12-ct_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-0-0","id":"15966098","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"611665","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-8-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5150ai-m12-ct%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5150ai-m12-ct:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5150ai-m12-ct:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-1-0","id":"15966130","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":9,"dataTestId":"vuln-software-config-9","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-9-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-9-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5250ai-m12-ct%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5250ai-m12-ct:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5250ai-m12-ct:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-0-0","id":"15966132","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-9-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5250ai-m12-ct_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5250ai-m12-ct_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5250ai-m12-ct_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-1-0","id":"15966131","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"611667","rangeCpes":[]}],"containers":[]}]}]},{"id":10,"dataTestId":"vuln-software-config-10","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-10-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-10-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5450ai-m12-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5450ai-m12-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5450ai-m12-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-0","id":"15966134","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-10-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5450ai-m12-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5450ai-m12-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5450ai-m12-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-1-0","id":"15966133","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"611669","rangeCpes":[]}],"containers":[]}]}]},{"id":11,"dataTestId":"vuln-software-config-11","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-11-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-11-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5450ai-m12%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5450ai-m12:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5450ai-m12:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-0-0","id":"15966136","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-11-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5450ai-m12_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5450ai-m12_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5450ai-m12_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-1-0","id":"15966135","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"611671","rangeCpes":[]}],"containers":[]}]}]},{"id":12,"dataTestId":"vuln-software-config-12","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-12-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-12-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5450ai-m12-ct%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5450ai-m12-ct:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5450ai-m12-ct:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-12-0-0-0","id":"15966138","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-12-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5450ai-m12-ct_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5450ai-m12-ct_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5450ai-m12-ct_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-12-0-1-0","id":"15966137","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"611673","rangeCpes":[]}],"containers":[]}]}]},{"id":13,"dataTestId":"vuln-software-config-13","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-13-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-13-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5130_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5130_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5130_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-13-0-0-0","id":"15966153","matchCpes":[],"rangeDescription":" versions up to (including) 3.10 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.10","rangeId":"614011","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-13-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5130%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5130:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-13-0-1-0","id":"15966154","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":14,"dataTestId":"vuln-software-config-14","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-14-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-14-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5150_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5150_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5150_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-14-0-0-0","id":"15966155","matchCpes":[],"rangeDescription":" versions up to (including) 3.10 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.10","rangeId":"614013","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-14-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5150%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5150:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-14-0-1-0","id":"15966156","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":15,"dataTestId":"vuln-software-config-15","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-15-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-15-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5110_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5110_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5110_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-15-0-0-0","id":"15966157","matchCpes":[],"rangeDescription":" versions up to (including) 2.10 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.10","rangeId":"614012","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-15-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5110%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5110:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-15-0-1-0","id":"15966158","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":16,"dataTestId":"vuln-software-config-16","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-16-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-16-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5110-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5110-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5110-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-16-0-0-0","id":"15966159","matchCpes":[],"rangeDescription":" versions up to (including) 2.10 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.10","rangeId":"614014","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-16-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5110-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5110-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5110-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-16-0-1-0","id":"15966160","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":17,"dataTestId":"vuln-software-config-17","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-17-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-17-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5110a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5110a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-17-0-0-0","id":"15966099","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-17-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5110a_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5110a_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5110a_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-17-0-1-0","id":"15966161","matchCpes":[],"rangeDescription":" versions up to (including) 1.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.6","rangeId":"614016","rangeCpes":[]}],"containers":[]}]}]},{"id":18,"dataTestId":"vuln-software-config-18","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-18-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-18-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5110a-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5110a-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5110a-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-18-0-0-0","id":"15966100","matchCpes":[],"rangeDescription":" versions up to (including) 1.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.6","rangeId":"614017","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-18-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5110a-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5110a-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5110a-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-18-0-1-0","id":"15966101","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":19,"dataTestId":"vuln-software-config-19","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-19-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-19-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5130a_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5130a_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5130a_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-19-0-0-0","id":"15966102","matchCpes":[],"rangeDescription":" versions up to (including) 1.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.6","rangeId":"614019","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-19-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5130a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5130a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-19-0-1-0","id":"15966103","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":20,"dataTestId":"vuln-software-config-20","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-20-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-20-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5130a-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5130a-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5130a-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-20-0-0-0","id":"15966104","matchCpes":[],"rangeDescription":" versions up to (including) 1.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.6","rangeId":"614020","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-20-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5130a-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5130a-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5130a-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-20-0-1-0","id":"15966105","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":21,"dataTestId":"vuln-software-config-21","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-21-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-21-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5150a_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5150a_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5150a_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-21-0-0-0","id":"15966106","matchCpes":[],"rangeDescription":" versions up to (including) 1.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.6","rangeId":"614022","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-21-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5150a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5150a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-21-0-1-0","id":"15966107","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":22,"dataTestId":"vuln-software-config-22","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-22-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-22-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5150a-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5150a-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5150a-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-22-0-0-0","id":"15966108","matchCpes":[],"rangeDescription":" versions up to (including) 1.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.6","rangeId":"614023","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-22-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5150a-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5150a-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5150a-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-22-0-1-0","id":"15966109","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":23,"dataTestId":"vuln-software-config-23","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-23-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-23-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5210a_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5210a_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5210a_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-23-0-0-0","id":"15966110","matchCpes":[],"rangeDescription":" versions up to (including) 1.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.6","rangeId":"614025","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-23-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5210a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5210a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-23-0-1-0","id":"15966111","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":24,"dataTestId":"vuln-software-config-24","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-24-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-24-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5210a-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5210a-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5210a-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-24-0-0-0","id":"15966112","matchCpes":[],"rangeDescription":" versions up to (including) 1.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.6","rangeId":"614026","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-24-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5210a-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5210a-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5210a-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-24-0-1-0","id":"15966113","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":25,"dataTestId":"vuln-software-config-25","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-25-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-25-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5230a_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5230a_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5230a_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-25-0-0-0","id":"15966114","matchCpes":[],"rangeDescription":" versions up to (including) 1.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.6","rangeId":"614028","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-25-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5230a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5230a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-25-0-1-0","id":"15966115","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":26,"dataTestId":"vuln-software-config-26","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-26-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-26-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5230a-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5230a-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5230a-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-26-0-0-0","id":"15966116","matchCpes":[],"rangeDescription":" versions up to (including) 1.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.6","rangeId":"614029","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-26-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5230a-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5230a-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5230a-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-26-0-1-0","id":"15966117","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":27,"dataTestId":"vuln-software-config-27","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-27-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-27-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5250a_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5250a_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5250a_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-27-0-0-0","id":"15966118","matchCpes":[],"rangeDescription":" versions up to (including) 1.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.6","rangeId":"614031","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-27-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5250a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5250a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-27-0-1-0","id":"15966119","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":28,"dataTestId":"vuln-software-config-28","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-28-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-28-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5250a-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5250a-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5250a-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-28-0-0-0","id":"15966120","matchCpes":[],"rangeDescription":" versions up to (including) 1.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.6","rangeId":"614032","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-28-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5250a-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5250a-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5250a-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-28-0-1-0","id":"15966151","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":29,"dataTestId":"vuln-software-config-29","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-29-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-29-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5210_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5210_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5210_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-29-0-0-0","id":"15966152","matchCpes":[],"rangeDescription":" versions up to (including) 2.12 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.12","rangeId":"616716","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-29-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5210%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5210:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-29-0-1-0","id":"15966162","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":30,"dataTestId":"vuln-software-config-30","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-30-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-30-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5232_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5232_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5232_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-30-0-0-0","id":"15966163","matchCpes":[],"rangeDescription":" versions up to (including) 2.12 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.12","rangeId":"616725","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-30-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5232%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5232:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-30-0-1-0","id":"15966164","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":31,"dataTestId":"vuln-software-config-31","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-31-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-31-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5210-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5210-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5210-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-31-0-0-0","id":"15966165","matchCpes":[],"rangeDescription":" versions up to (including) 2.12 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.12","rangeId":"616717","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-31-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5210-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5210-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5210-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-31-0-1-0","id":"15966166","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":32,"dataTestId":"vuln-software-config-32","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-32-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-32-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5232-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5232-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5232-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-32-0-0-0","id":"15966167","matchCpes":[],"rangeDescription":" versions up to (including) 2.12 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.12","rangeId":"616719","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-32-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5232-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5232-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5232-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-32-0-1-0","id":"15966168","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":33,"dataTestId":"vuln-software-config-33","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-33-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-33-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5230-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5230-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5230-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-33-0-0-0","id":"15966169","matchCpes":[],"rangeDescription":" versions up to (including) 2.12 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.12","rangeId":"616721","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-33-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5230-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5230-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5230-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-33-0-1-0","id":"15966170","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":34,"dataTestId":"vuln-software-config-34","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-34-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-34-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5232i-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5232i-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5232i-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-34-0-0-0","id":"15966171","matchCpes":[],"rangeDescription":" versions up to (including) 2.12 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.12","rangeId":"616723","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-34-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5232i-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5232i-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5232i-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-34-0-1-0","id":"15966172","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":35,"dataTestId":"vuln-software-config-35","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-35-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-35-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5230_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5230_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5230_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-35-0-0-0","id":"15966173","matchCpes":[],"rangeDescription":" versions up to (including) 2.12 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.12","rangeId":"616714","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-35-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5230%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5230:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-35-0-1-0","id":"15966174","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":36,"dataTestId":"vuln-software-config-36","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-36-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-36-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5232i_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5232i_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5232i_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-36-0-0-0","id":"15966175","matchCpes":[],"rangeDescription":" versions up to (including) 2.12 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.12","rangeId":"616715","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-36-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5232i%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5232i:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-36-0-1-0","id":"15966176","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":37,"dataTestId":"vuln-software-config-37","totalCpeCount":3,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-37-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-37-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5410_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5410_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5410_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-37-0-0-0","id":"15966178","matchCpes":[],"rangeDescription":" versions from (including) 2.0 up to (including) 2.9 ","rangeStartType":"including","rangeStartVersion":"2.0","rangeEndType":"including","rangeEndVersion":"2.9","rangeId":"617871","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5410_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5410_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5410_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-37-0-0-1","id":"15966177","matchCpes":[],"rangeDescription":" versions from (including) 3.2 up to (including) 3.14 ","rangeStartType":"including","rangeStartVersion":"3.2","rangeEndType":"including","rangeEndVersion":"3.14","rangeId":"617864","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-37-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5410%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5410:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-37-0-1-0","id":"15966179","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":38,"dataTestId":"vuln-software-config-38","totalCpeCount":3,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-38-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-38-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5430_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5430_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5430_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-38-0-0-0","id":"15966181","matchCpes":[],"rangeDescription":" versions from (including) 2.0 up to (including) 2.9 ","rangeStartType":"including","rangeStartVersion":"2.0","rangeEndType":"including","rangeEndVersion":"2.9","rangeId":"617870","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5430_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5430_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5430_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-38-0-0-1","id":"15966180","matchCpes":[],"rangeDescription":" versions from (including) 3.2 up to (including) 3.14 ","rangeStartType":"including","rangeStartVersion":"3.2","rangeEndType":"including","rangeEndVersion":"3.14","rangeId":"617865","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-38-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5430%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5430:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-38-0-1-0","id":"15966182","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":39,"dataTestId":"vuln-software-config-39","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-39-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-39-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5450_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5450_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5450_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-39-0-0-0","id":"15966183","matchCpes":[],"rangeDescription":" versions up to (including) 3.14 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.14","rangeId":"617867","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-39-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5450%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5450:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-39-0-1-0","id":"15966184","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":40,"dataTestId":"vuln-software-config-40","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-40-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-40-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5450i_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5450i_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5450i_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-40-0-0-0","id":"15966185","matchCpes":[],"rangeDescription":" versions up to (including) 3.14 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.14","rangeId":"617868","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-40-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5450i%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5450i:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-40-0-1-0","id":"15966186","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":41,"dataTestId":"vuln-software-config-41","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-41-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-41-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5450-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5450-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5450-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-41-0-0-0","id":"15966187","matchCpes":[],"rangeDescription":" versions up to (including) 3.14 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.14","rangeId":"617869","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-41-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5450-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5450-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-41-0-1-0","id":"15966188","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":42,"dataTestId":"vuln-software-config-42","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-42-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-42-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5450i-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5450i-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-42-0-0-0","id":"15966221","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-42-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5450i-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5450i-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5450i-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-42-0-1-0","id":"15966222","matchCpes":[],"rangeDescription":" versions up to (including) 3.14 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.14","rangeId":"617866","rangeCpes":[]}],"containers":[]}]}]},{"id":43,"dataTestId":"vuln-software-config-43","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-43-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-43-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5610-8-48v_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5610-8-48v_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5610-8-48v_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-43-0-0-0","id":"15966197","matchCpes":[],"rangeDescription":" versions up to (including) 3.11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.11","rangeId":"617873","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-43-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5610-8-48v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5610-8-48v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5610-8-48v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-43-0-1-0","id":"15966198","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":44,"dataTestId":"vuln-software-config-44","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-44-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-44-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5630-16_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5630-16_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5630-16_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-44-0-0-0","id":"15966199","matchCpes":[],"rangeDescription":" versions up to (including) 3.11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.11","rangeId":"617875","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-44-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5630-16%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5630-16:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5630-16:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-44-0-1-0","id":"15966200","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":45,"dataTestId":"vuln-software-config-45","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-45-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-45-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5630-8_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5630-8_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5630-8_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-45-0-0-0","id":"15966201","matchCpes":[],"rangeDescription":" versions up to (including) 3.11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.11","rangeId":"617877","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-45-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5630-8%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5630-8:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5630-8:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-45-0-1-0","id":"15966202","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":46,"dataTestId":"vuln-software-config-46","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-46-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-46-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5650-8_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5650-8_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5650-8_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-46-0-0-0","id":"15966203","matchCpes":[],"rangeDescription":" versions up to (including) 3.11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.11","rangeId":"617879","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-46-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5650-8%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5650-8:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5650-8:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-46-0-1-0","id":"15966204","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":47,"dataTestId":"vuln-software-config-47","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-47-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-47-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5610-16_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5610-16_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5610-16_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-47-0-0-0","id":"15966205","matchCpes":[],"rangeDescription":" versions up to (including) 3.11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.11","rangeId":"617881","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-47-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5610-16%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5610-16:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5610-16:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-47-0-1-0","id":"15966206","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":48,"dataTestId":"vuln-software-config-48","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-48-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-48-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5650-8-m-sc_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5650-8-m-sc_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5650-8-m-sc_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-48-0-0-0","id":"15966207","matchCpes":[],"rangeDescription":" versions up to (including) 3.11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.11","rangeId":"617883","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-48-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5650-8-m-sc%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5650-8-m-sc:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5650-8-m-sc:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-48-0-1-0","id":"15966208","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":49,"dataTestId":"vuln-software-config-49","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-49-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-49-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5650-8-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5650-8-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5650-8-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-49-0-0-0","id":"15966209","matchCpes":[],"rangeDescription":" versions up to (including) 3.11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.11","rangeId":"617885","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-49-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5650-8-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5650-8-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5650-8-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-49-0-1-0","id":"15966210","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":50,"dataTestId":"vuln-software-config-50","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-50-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-50-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5650-16-s-sc_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5650-16-s-sc_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5650-16-s-sc_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-50-0-0-0","id":"15966211","matchCpes":[],"rangeDescription":" versions up to (including) 3.11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.11","rangeId":"617887","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-50-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5650-16-s-sc%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5650-16-s-sc:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5650-16-s-sc:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-50-0-1-0","id":"15966212","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":51,"dataTestId":"vuln-software-config-51","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-51-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-51-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5650-8-hv-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5650-8-hv-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5650-8-hv-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-51-0-0-0","id":"15966213","matchCpes":[],"rangeDescription":" versions up to (including) 3.11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.11","rangeId":"617889","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-51-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5650-8-hv-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5650-8-hv-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5650-8-hv-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-51-0-1-0","id":"15966214","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":52,"dataTestId":"vuln-software-config-52","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-52-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-52-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5650-16-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5650-16-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5650-16-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-52-0-0-0","id":"15966219","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-52-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5650-16-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5650-16-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5650-16-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-52-0-1-0","id":"15966220","matchCpes":[],"rangeDescription":" versions up to (including) 3.11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.11","rangeId":"617895","rangeCpes":[]}],"containers":[]}]}]},{"id":53,"dataTestId":"vuln-software-config-53","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-53-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-53-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5650-16%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5650-16:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5650-16:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-53-0-0-0","id":"15966217","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-53-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5650-16_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5650-16_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5650-16_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-53-0-1-0","id":"15966218","matchCpes":[],"rangeDescription":" versions up to (including) 3.11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.11","rangeId":"617897","rangeCpes":[]}],"containers":[]}]}]},{"id":54,"dataTestId":"vuln-software-config-54","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-54-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-54-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5650-16-hv-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5650-16-hv-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5650-16-hv-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-54-0-0-0","id":"15966215","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-54-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5650-16-hv-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5650-16-hv-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5650-16-hv-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-54-0-1-0","id":"15966216","matchCpes":[],"rangeDescription":" versions up to (including) 3.11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.11","rangeId":"617899","rangeCpes":[]}],"containers":[]}]}]},{"id":55,"dataTestId":"vuln-software-config-55","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-55-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-55-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5610-8_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5610-8_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5610-8_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-55-0-0-0","id":"15966189","matchCpes":[],"rangeDescription":" versions up to (including) 3.11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.11","rangeId":"617901","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-55-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5610-8%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5610-8:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5610-8:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-55-0-1-0","id":"15966190","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":56,"dataTestId":"vuln-software-config-56","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-56-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-56-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5610-16-48v_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5610-16-48v_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5610-16-48v_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-56-0-0-0","id":"15966191","matchCpes":[],"rangeDescription":" versions up to (including) 3.11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.11","rangeId":"617892","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-56-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5610-16-48v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5610-16-48v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5610-16-48v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-56-0-1-0","id":"15966192","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":57,"dataTestId":"vuln-software-config-57","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-57-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-57-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5650-8-s-sc_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5650-8-s-sc_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5650-8-s-sc_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-57-0-0-0","id":"15966193","matchCpes":[],"rangeDescription":" versions up to (including) 3.11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.11","rangeId":"617903","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-57-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5650-8-s-sc%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5650-8-s-sc:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5650-8-s-sc:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-57-0-1-0","id":"15966194","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":58,"dataTestId":"vuln-software-config-58","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-58-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-58-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5650-16-m-sc_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5650-16-m-sc_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5650-16-m-sc_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-58-0-0-0","id":"15966195","matchCpes":[],"rangeDescription":" versions up to (including) 3.11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.11","rangeId":"617894","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-58-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5650-16-m-sc%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5650-16-m-sc:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5650-16-m-sc:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-58-0-1-0","id":"15966196","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":59,"dataTestId":"vuln-software-config-59","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-59-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-59-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5610-8-dt_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5610-8-dt_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5610-8-dt_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-59-0-0-0","id":"15966223","matchCpes":[],"rangeDescription":" versions up to (including) 2.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.9","rangeId":"617904","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-59-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5610-8-dt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5610-8-dt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5610-8-dt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-59-0-1-0","id":"15966224","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":60,"dataTestId":"vuln-software-config-60","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-60-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-60-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5610-8-dt-j_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5610-8-dt-j_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5610-8-dt-j_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-60-0-0-0","id":"15966225","matchCpes":[],"rangeDescription":" versions up to (including) 2.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.9","rangeId":"617910","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-60-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5610-8-dt-j%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5610-8-dt-j:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5610-8-dt-j:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-60-0-1-0","id":"15966226","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":61,"dataTestId":"vuln-software-config-61","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-61-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-61-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5650-8-dt_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5650-8-dt_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5650-8-dt_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-61-0-0-0","id":"15966227","matchCpes":[],"rangeDescription":" versions up to (including) 2.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.9","rangeId":"617912","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-61-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5650-8-dt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5650-8-dt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5650-8-dt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-61-0-1-0","id":"15966228","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":62,"dataTestId":"vuln-software-config-62","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-62-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-62-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5650-8-dt-j_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5650-8-dt-j_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5650-8-dt-j_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-62-0-0-0","id":"15966229","matchCpes":[],"rangeDescription":" versions up to (including) 2.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.9","rangeId":"617914","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-62-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5650-8-dt-j%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5650-8-dt-j:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5650-8-dt-j:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-62-0-1-0","id":"15966230","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":63,"dataTestId":"vuln-software-config-63","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-63-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-63-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5650i-8-dt_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5650i-8-dt_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5650i-8-dt_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-63-0-0-0","id":"15966231","matchCpes":[],"rangeDescription":" versions up to (including) 2.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.9","rangeId":"617916","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-63-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5650i-8-dt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5650i-8-dt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5650i-8-dt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-63-0-1-0","id":"15966232","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":64,"dataTestId":"vuln-software-config-64","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-64-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-64-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5610-8-dt-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5610-8-dt-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5610-8-dt-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-64-0-0-0","id":"15966233","matchCpes":[],"rangeDescription":" versions up to (including) 2.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.9","rangeId":"617918","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-64-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5610-8-dt-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5610-8-dt-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5610-8-dt-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-64-0-1-0","id":"15966234","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":65,"dataTestId":"vuln-software-config-65","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-65-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-65-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5650i-8-dt-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5650i-8-dt-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5650i-8-dt-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-65-0-0-0","id":"15966235","matchCpes":[],"rangeDescription":" versions up to (including) 2.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.9","rangeId":"617906","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-65-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5650i-8-dt-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5650i-8-dt-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5650i-8-dt-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-65-0-1-0","id":"15966236","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":66,"dataTestId":"vuln-software-config-66","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-66-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-66-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_5650-8-dt-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_5650-8-dt-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_5650-8-dt-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-66-0-0-0","id":"15966256","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-66-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_5650-8-dt-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_5650-8-dt-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_5650-8-dt-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-66-0-1-0","id":"15966257","matchCpes":[],"rangeDescription":" versions up to (including) 2.9 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.9","rangeId":"617908","rangeCpes":[]}],"containers":[]}]}]},{"id":67,"dataTestId":"vuln-software-config-67","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-67-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-67-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-67-0-0-0","id":"15966237","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617942","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-67-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-67-0-1-0","id":"15966238","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":68,"dataTestId":"vuln-software-config-68","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-68-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-68-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150i_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150i_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150i_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-68-0-0-0","id":"15966239","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617944","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-68-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150i%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150i:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150i:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-68-0-1-0","id":"15966240","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":69,"dataTestId":"vuln-software-config-69","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-69-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-69-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150-m-sc_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150-m-sc_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150-m-sc_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-69-0-0-0","id":"15966241","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617946","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-69-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150-m-sc%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150-m-sc:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150-m-sc:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-69-0-1-0","id":"15966242","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":70,"dataTestId":"vuln-software-config-70","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-70-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-70-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150i-m-sc_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150i-m-sc_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150i-m-sc_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-70-0-0-0","id":"15966243","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617948","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-70-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150i-m-sc%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150i-m-sc:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150i-m-sc:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-70-0-1-0","id":"15966244","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":71,"dataTestId":"vuln-software-config-71","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-71-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-71-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150-s-sc_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150-s-sc_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150-s-sc_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-71-0-0-0","id":"15966245","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617950","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-71-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150-s-sc%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150-s-sc:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150-s-sc:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-71-0-1-0","id":"15966246","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":72,"dataTestId":"vuln-software-config-72","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-72-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-72-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150i-s-sc_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150i-s-sc_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150i-s-sc_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-72-0-0-0","id":"15966247","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617952","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-72-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150i-s-sc%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150i-s-sc:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150i-s-sc:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-72-0-1-0","id":"15966248","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":73,"dataTestId":"vuln-software-config-73","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-73-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-73-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-73-0-0-0","id":"15966249","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617954","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-73-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-73-0-1-0","id":"15966250","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":74,"dataTestId":"vuln-software-config-74","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-74-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-74-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150i-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150i-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150i-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-74-0-0-0","id":"15966251","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617956","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-74-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150i-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150i-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150i-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-74-0-1-0","id":"15966252","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":75,"dataTestId":"vuln-software-config-75","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-75-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-75-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150-m-sc-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150-m-sc-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150-m-sc-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-75-0-0-0","id":"15966253","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617958","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-75-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150-m-sc-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150-m-sc-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150-m-sc-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-75-0-1-0","id":"15966254","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":76,"dataTestId":"vuln-software-config-76","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-76-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-76-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150i-m-sc-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150i-m-sc-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150i-m-sc-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-76-0-0-0","id":"15966255","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617960","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-76-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150i-m-sc-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150i-m-sc-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150i-m-sc-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-76-0-1-0","id":"15966258","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":77,"dataTestId":"vuln-software-config-77","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-77-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-77-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150-s-sc-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150-s-sc-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150-s-sc-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-77-0-0-0","id":"15966259","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617962","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-77-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150-s-sc-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150-s-sc-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150-s-sc-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-77-0-1-0","id":"15966260","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":78,"dataTestId":"vuln-software-config-78","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-78-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-78-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150i-s-sc-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150i-s-sc-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150i-s-sc-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-78-0-0-0","id":"15966261","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617964","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-78-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150i-s-sc-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150i-s-sc-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150i-s-sc-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-78-0-1-0","id":"15966262","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":79,"dataTestId":"vuln-software-config-79","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-79-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-79-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5250_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5250_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5250_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-79-0-0-0","id":"15966263","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617966","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-79-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5250%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5250:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5250:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-79-0-1-0","id":"15966264","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":80,"dataTestId":"vuln-software-config-80","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-80-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-80-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5250-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5250-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5250-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-80-0-0-0","id":"15966265","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617968","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-80-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5250-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5250-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5250-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-80-0-1-0","id":"15966266","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":81,"dataTestId":"vuln-software-config-81","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-81-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-81-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150-m-st_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150-m-st_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150-m-st_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-81-0-0-0","id":"15966267","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617970","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-81-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150-m-st%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150-m-st:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150-m-st:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-81-0-1-0","id":"15966268","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":82,"dataTestId":"vuln-software-config-82","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-82-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-82-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150-m-st-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150-m-st-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150-m-st-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-82-0-0-0","id":"15966269","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617972","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-82-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150-m-st-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150-m-st-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150-m-st-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-82-0-1-0","id":"15966270","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":83,"dataTestId":"vuln-software-config-83","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-83-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-83-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5250i_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5250i_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5250i_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-83-0-0-0","id":"15966271","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617974","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-83-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5250i%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5250i:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5250i:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-83-0-1-0","id":"15966272","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":84,"dataTestId":"vuln-software-config-84","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-84-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-84-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5250i-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5250i-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5250i-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-84-0-0-0","id":"15966273","matchCpes":[],"rangeDescription":" versions up to (including) 1.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.7","rangeId":"617976","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-84-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5250i-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5250i-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5250i-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-84-0-1-0","id":"15966274","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":85,"dataTestId":"vuln-software-config-85","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-85-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-85-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-85-0-0-0","id":"15966275","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"617978","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-85-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-85-0-1-0","id":"15966276","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":86,"dataTestId":"vuln-software-config-86","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-86-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-86-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150i_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150i_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150i_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-86-0-0-0","id":"15966277","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"617980","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-86-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150i%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150i:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150i:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-86-0-1-0","id":"15966278","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":87,"dataTestId":"vuln-software-config-87","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-87-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-87-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150-m-sc_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150-m-sc_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150-m-sc_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-87-0-0-0","id":"15966279","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"617982","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-87-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150-m-sc%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150-m-sc:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150-m-sc:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-87-0-1-0","id":"15966280","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":88,"dataTestId":"vuln-software-config-88","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-88-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-88-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150i-m-sc_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150i-m-sc_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150i-m-sc_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-88-0-0-0","id":"15966281","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"617984","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-88-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150i-m-sc%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150i-m-sc:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150i-m-sc:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-88-0-1-0","id":"15966282","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":89,"dataTestId":"vuln-software-config-89","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-89-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-89-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150-s-sc_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150-s-sc_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150-s-sc_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-89-0-0-0","id":"15966283","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"618003","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-89-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150-s-sc%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150-s-sc:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150-s-sc:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-89-0-1-0","id":"15966284","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":90,"dataTestId":"vuln-software-config-90","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-90-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-90-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150i-s-sc_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150i-s-sc_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150i-s-sc_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-90-0-0-0","id":"15966285","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"618005","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-90-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150i-s-sc%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150i-s-sc:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150i-s-sc:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-90-0-1-0","id":"15966286","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":91,"dataTestId":"vuln-software-config-91","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-91-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-91-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-91-0-0-0","id":"15966287","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"618007","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-91-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150-t%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150-t:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150-t:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-91-0-1-0","id":"15966288","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":92,"dataTestId":"vuln-software-config-92","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-92-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-92-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150i-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150i-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150i-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-92-0-0-0","id":"15966289","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"618009","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-92-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150i-t%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150i-t:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150i-t:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-92-0-1-0","id":"15966290","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":93,"dataTestId":"vuln-software-config-93","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-93-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-93-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150-m-sc-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150-m-sc-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150-m-sc-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-93-0-0-0","id":"15966291","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"618011","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-93-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150-m-sc-t%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150-m-sc-t:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150-m-sc-t:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-93-0-1-0","id":"15966292","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":94,"dataTestId":"vuln-software-config-94","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-94-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-94-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150i-m-sc-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150i-m-sc-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150i-m-sc-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-94-0-0-0","id":"15966293","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"618013","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-94-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150i-m-sc-t%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150i-m-sc-t:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150i-m-sc-t:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-94-0-1-0","id":"15966294","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":95,"dataTestId":"vuln-software-config-95","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-95-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-95-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150-s-sc-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150-s-sc-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150-s-sc-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-95-0-0-0","id":"15966295","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"617987","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-95-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150-s-sc-t%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150-s-sc-t:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150-s-sc-t:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-95-0-1-0","id":"15966296","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":96,"dataTestId":"vuln-software-config-96","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-96-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-96-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150i-s-sc-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150i-s-sc-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150i-s-sc-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-96-0-0-0","id":"15966297","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"617989","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-96-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150i-s-sc-t%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150i-s-sc-t:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150i-s-sc-t:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-96-0-1-0","id":"15966298","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":97,"dataTestId":"vuln-software-config-97","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-97-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-97-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5250_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5250_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5250_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-97-0-0-0","id":"15966299","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"617991","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-97-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5250%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5250:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5250:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-97-0-1-0","id":"15966300","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":98,"dataTestId":"vuln-software-config-98","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-98-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-98-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5250-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5250-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5250-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-98-0-0-0","id":"15966301","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"617993","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-98-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5250-t%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5250-t:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5250-t:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-98-0-1-0","id":"15966302","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":99,"dataTestId":"vuln-software-config-99","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-99-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-99-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150-m-st_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150-m-st_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150-m-st_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-99-0-0-0","id":"15966303","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"617995","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-99-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150-m-st%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150-m-st:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150-m-st:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-99-0-1-0","id":"15966304","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":100,"dataTestId":"vuln-software-config-100","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-100-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-100-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5150-m-st-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5150-m-st-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5150-m-st-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-100-0-0-0","id":"15966305","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"617997","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-100-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5150-m-st-t%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5150-m-st-t:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5150-m-st-t:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-100-0-1-0","id":"15966306","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":101,"dataTestId":"vuln-software-config-101","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-101-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-101-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5250i_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5250i_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5250i_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-101-0-0-0","id":"15966307","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"617999","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-101-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5250i%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5250i:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5250i:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-101-0-1-0","id":"15966308","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":102,"dataTestId":"vuln-software-config-102","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-102-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-102-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia-5250i-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia-5250i-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia-5250i-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-102-0-0-0","id":"15966309","matchCpes":[],"rangeDescription":" versions up to (including) 2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.1","rangeId":"618001","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-102-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia-5250i-t%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia-5250i-t:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia-5250i-t:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-102-0-1-0","id":"15966310","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":103,"dataTestId":"vuln-software-config-103","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-103-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-103-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5450a_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5450a_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5450a_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-103-0-0-0","id":"15966311","matchCpes":[],"rangeDescription":" versions up to (including) 2.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.0","rangeId":"618020","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-103-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5450a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5450a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5450a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-103-0-1-0","id":"15966312","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":104,"dataTestId":"vuln-software-config-104","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-104-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-104-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5450ai_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5450ai_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5450ai_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-104-0-0-0","id":"15966313","matchCpes":[],"rangeDescription":" versions up to (including) 2.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.0","rangeId":"618014","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-104-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5450ai%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5450ai:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5450ai:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-104-0-1-0","id":"15966314","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":105,"dataTestId":"vuln-software-config-105","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-105-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-105-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5450ai-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5450ai-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5450ai-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-105-0-0-0","id":"15966315","matchCpes":[],"rangeDescription":" versions up to (including) 2.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.0","rangeId":"618016","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-105-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5450ai-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5450ai-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5450ai-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-105-0-1-0","id":"15966316","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":106,"dataTestId":"vuln-software-config-106","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-106-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-106-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5450a-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5450a-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5450a-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-106-0-0-0","id":"15966317","matchCpes":[],"rangeDescription":" versions up to (including) 2.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.0","rangeId":"618018","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-106-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5450a-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5450a-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5450a-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-106-0-1-0","id":"15966318","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":107,"dataTestId":"vuln-software-config-107","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-107-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-107-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5150a_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5150a_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5150a_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-107-0-0-0","id":"15966077","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"618048","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-107-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5150a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5150a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5150a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-107-0-1-0","id":"15966078","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":108,"dataTestId":"vuln-software-config-108","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-108-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-108-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5150ai_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5150ai_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5150ai_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-108-0-0-0","id":"15966079","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"618027","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-108-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5150ai%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5150ai:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5150ai:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-108-0-1-0","id":"15966080","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":109,"dataTestId":"vuln-software-config-109","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-109-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-109-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5150ai-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5150ai-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5150ai-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-109-0-0-0","id":"15966081","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"618035","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-109-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5150ai-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5150ai-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5150ai-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-109-0-1-0","id":"15966082","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":110,"dataTestId":"vuln-software-config-110","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-110-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-110-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5150a-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5150a-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5150a-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-110-0-0-0","id":"15966083","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"618042","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-110-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5150a-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5150a-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5150a-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-110-0-1-0","id":"15966084","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":111,"dataTestId":"vuln-software-config-111","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-111-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-111-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5250a_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5250a_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5250a_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-111-0-0-0","id":"15966085","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"618050","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-111-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5250a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5250a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5250a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-111-0-1-0","id":"15966086","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":112,"dataTestId":"vuln-software-config-112","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-112-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-112-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5250ai_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5250ai_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5250ai_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-112-0-0-0","id":"15966087","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"618033","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-112-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5250ai%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5250ai:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5250ai:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-112-0-1-0","id":"15966088","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":113,"dataTestId":"vuln-software-config-113","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-113-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-113-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5250ai-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5250ai-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5250ai-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-113-0-0-0","id":"15966089","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"618022","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-113-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5250ai-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5250ai-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5250ai-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-113-0-1-0","id":"15966090","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":114,"dataTestId":"vuln-software-config-114","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-114-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-114-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5250a-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5250a-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5250a-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-114-0-0-0","id":"15966091","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"618024","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-114-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5250a-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5250a-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5250a-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-114-0-1-0","id":"15966092","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":115,"dataTestId":"vuln-software-config-115","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-115-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-115-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5150a-iex_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5150a-iex_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5150a-iex_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-115-0-0-0","id":"15966093","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"618029","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-115-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5150a-iex%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5150a-iex:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5150a-iex:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-115-0-1-0","id":"15966094","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":116,"dataTestId":"vuln-software-config-116","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-116-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-116-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5150ai-iex_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5150ai-iex_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5150ai-iex_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-116-0-0-0","id":"15966095","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"618031","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-116-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5150ai-iex%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5150ai-iex:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5150ai-iex:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-116-0-1-0","id":"15966121","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":117,"dataTestId":"vuln-software-config-117","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-117-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-117-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5150ai-t-iex_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5150ai-t-iex_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5150ai-t-iex_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-117-0-0-0","id":"15966065","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"618036","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-117-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5150ai-t-iex%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5150ai-t-iex:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5150ai-t-iex:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-117-0-1-0","id":"15966066","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":118,"dataTestId":"vuln-software-config-118","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-118-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-118-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5150a-t-iex_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5150a-t-iex_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5150a-t-iex_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-118-0-0-0","id":"15966067","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"618040","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-118-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5150a-t-iex%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5150a-t-iex:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5150a-t-iex:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-118-0-1-0","id":"15966068","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":119,"dataTestId":"vuln-software-config-119","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-119-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-119-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5250a-iex_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5250a-iex_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5250a-iex_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-119-0-0-0","id":"15966069","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"618046","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-119-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5250a-iex%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5250a-iex:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5250a-iex:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-119-0-1-0","id":"15966070","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":120,"dataTestId":"vuln-software-config-120","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-120-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-120-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5250ai-iex_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5250ai-iex_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5250ai-iex_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-120-0-0-0","id":"15966071","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"618026","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-120-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5250ai-iex%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5250ai-iex:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5250ai-iex:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-120-0-1-0","id":"15966072","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":121,"dataTestId":"vuln-software-config-121","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-121-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-121-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5250ai-t-iex_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5250ai-t-iex_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5250ai-t-iex_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-121-0-0-0","id":"15966073","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"618038","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-121-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5250ai-t-iex%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5250ai-t-iex:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5250ai-t-iex:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-121-0-1-0","id":"15966074","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":122,"dataTestId":"vuln-software-config-122","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-122-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-122-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5250a-t-iex_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5250a-t-iex_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5250a-t-iex_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-122-0-0-0","id":"15966075","matchCpes":[],"rangeDescription":" versions up to (including) 1.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.5","rangeId":"618044","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-122-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5250a-t-iex%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5250a-t-iex:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5250a-t-iex:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-122-0-1-0","id":"15966076","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":123,"dataTestId":"vuln-software-config-123","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-123-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-123-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_ia5000a-i%5C%2Fo_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_ia5000a-i\\/o_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_ia5000a-i%2fo_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-123-0-0-0","id":"15966122","matchCpes":[],"rangeDescription":" versions up to (including) 2.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.0","rangeId":"618058","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-123-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_ia5000a-i%5C%2Fo%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_ia5000a-i\\/o:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_ia5000a-i%2fo:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-123-0-1-0","id":"15966123","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":124,"dataTestId":"vuln-software-config-124","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-124-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-124-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_iaw5000a-i%5C%2Fo_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_iaw5000a-i\\/o_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_iaw5000a-i%2fo_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-124-0-0-0","id":"15966124","matchCpes":[],"rangeDescription":" versions up to (including) 2.2 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"2.2","rangeId":"604230","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-124-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_iaw5000a-i%5C%2Fo%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_iaw5000a-i\\/o:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_iaw5000a-i%2fo:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-124-0-1-0","id":"15966125","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":125,"dataTestId":"vuln-software-config-125","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-125-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-125-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_p5150a_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_p5150a_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_p5150a_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-125-0-0-0","id":"15966126","matchCpes":[],"rangeDescription":" versions up to (including) 1.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.6","rangeId":"618054","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-125-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_p5150a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_p5150a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_p5150a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-125-0-1-0","id":"15966127","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":126,"dataTestId":"vuln-software-config-126","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-126-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-126-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amoxa%3Anport_p5150a-t_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:moxa:nport_p5150a-t_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:moxa:nport_p5150a-t_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-126-0-0-0","id":"15966128","matchCpes":[],"rangeDescription":" versions up to (including) 1.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.6","rangeId":"618056","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-126-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Amoxa%3Anport_p5150a-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:moxa:nport_p5150a-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:moxa:nport_p5150a-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-126-0-1-0","id":"15966129","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]}]"/>
|
||
|
||
<p id="vulnCpeInfo" >
|
||
<small>
|
||
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
|
||
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
|
||
|
||
</small>
|
||
</p>
|
||
<script src="/site-media/js/vulnerability/cpe-match.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/configurationListing.js"
|
||
type="text/javascript"></script>
|
||
</div>
|
||
</div>
|
||
|
||
<div id="vulnChangeHistoryDiv"
|
||
data-testid="vuln-change-history-container">
|
||
<h3 id="VulnChangeHistorySection">Change History</h3>
|
||
<small> 3 change records found <a href="#VulnChangeHistorySection"
|
||
style="text-decoration: underline" id="changeHistoryToggle">show
|
||
changes</a>
|
||
</small>
|
||
<div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-0">CVE Modified by CVE</span> <span
|
||
data-testid="vuln-change-history-date-0">11/21/2024 3:36:17 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-1">CVE Modified by Moxa Inc.</span> <span
|
||
data-testid="vuln-change-history-date-1">5/14/2024 10:14:04 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-2">Initial Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-2">10/06/2023 11:28:40 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CWE</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST CWE-354</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5110-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.10
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5110-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5110_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.10
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5110a-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.6
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5110a-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5110a_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.6
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5130_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.10
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5130a-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.6
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5130a-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5130a_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.6
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5150_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.10
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5150a-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.6
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5150a-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5150a_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.6
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5150ai-m12-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5150ai-m12-ct-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5150ai-m12-ct_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5150ai-m12-ct:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5150ai-m12-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5150ai-m12-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5150ai-m12_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5150ai-m12:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5210-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.12
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5210-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5210_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.12
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5210a-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.6
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5210a-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5210a_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.6
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5230-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.12
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5230-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5230_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.12
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5230a-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.6
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5230a-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5230a_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.6
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5232-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.12
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5232-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5232_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.12
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5232i-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.12
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5232i-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5232i_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.12
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5250a-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.6
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5250a-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5250a_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.6
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5250ai-m12-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5250ai-m12-ct-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5250ai-m12-ct_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5250ai-m12-ct:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5250ai-m12-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5250ai-m12-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5250ai-m12_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5250ai-m12:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5410_firmware:*:*:*:*:*:*:*:* versions from (including) 2.0 up to (including) 2.9
|
||
*cpe:2.3:o:moxa:nport_5410_firmware:*:*:*:*:*:*:*:* versions from (including) 3.2 up to (including) 3.14
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5430_firmware:*:*:*:*:*:*:*:* versions from (including) 2.0 up to (including) 2.9
|
||
*cpe:2.3:o:moxa:nport_5430_firmware:*:*:*:*:*:*:*:* versions from (including) 3.2 up to (including) 3.14
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5450-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.14
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5450_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.14
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5450ai-m12-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5450ai-m12-ct-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5450ai-m12-ct_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5450ai-m12-ct:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5450ai-m12-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5450ai-m12-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5450ai-m12_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5450ai-m12:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5450i-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.14
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5450i_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.14
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5610-16-48v_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.11
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5610-16-48v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5610-16_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.11
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5610-16:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5610-8-48v_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.11
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5610-8-48v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5610-8-dt-j_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.9
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5610-8-dt-j:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5610-8-dt-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.9
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5610-8-dt-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5610-8-dt_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.9
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5610-8-dt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5610-8_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.11
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5610-8:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5630-16_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.11
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5630-16:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5630-8_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.11
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5630-8:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5650-16-hv-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.11
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5650-16-hv-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5650-16-m-sc_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.11
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5650-16-m-sc:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5650-16-s-sc_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.11
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5650-16-s-sc:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5650-16-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.11
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5650-16-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5650-16_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.11
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5650-16:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5650-8-dt-j_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.9
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5650-8-dt-j:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5650-8-dt-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.9
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5650-8-dt-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5650-8-dt_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.9
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5650-8-dt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5650-8-hv-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.11
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5650-8-hv-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5650-8-m-sc_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.11
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5650-8-m-sc:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5650-8-s-sc_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.11
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5650-8-s-sc:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5650-8-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.11
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5650-8-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5650-8_firmware:*:*:*:*:*:*:*:* versions up to (including) 3.11
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5650-8:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5650i-8-dt-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.9
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5650i-8-dt-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_5650i-8-dt_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.9
|
||
OR
|
||
cpe:2.3:h:moxa:nport_5650i-8-dt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150-m-sc-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150-m-sc-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150-m-sc-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150-m-sc-t:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150-m-sc_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150-m-sc:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150-m-sc_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150-m-sc:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150-m-st-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150-m-st-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150-m-st-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150-m-st-t:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150-m-st_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150-m-st:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150-m-st_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150-m-st:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150-s-sc-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150-s-sc-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150-s-sc-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150-s-sc-t:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150-s-sc_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150-s-sc:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150-s-sc_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150-s-sc:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150-t:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150i-m-sc-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150i-m-sc-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150i-m-sc-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150i-m-sc-t:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150i-m-sc_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150i-m-sc:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150i-m-sc_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150i-m-sc:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150i-s-sc-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150i-s-sc-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150i-s-sc-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150i-s-sc-t:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150i-s-sc_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150i-s-sc:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150i-s-sc_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150i-s-sc:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150i-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150i-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150i-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150i-t:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150i_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150i:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5150i_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5150i:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5250-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5250-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5250-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5250-t:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5250_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5250:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5250_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5250:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5250i-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5250i-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5250i-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5250i-t:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5250i_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.7
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5250i:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia-5250i_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.1
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia-5250i:2.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5000a-i\/o_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.0
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5000a-i\/o:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5150a-iex_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5150a-iex:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5150a-t-iex_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5150a-t-iex:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5150a-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5150a-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5150a_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5150a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5150ai-iex_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5150ai-iex:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5150ai-t-iex_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5150ai-t-iex:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5150ai-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5150ai-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5150ai_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5150ai:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5250a-iex_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5250a-iex:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5250a-t-iex_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5250a-t-iex:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5250a-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5250a-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5250a_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5250a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5250ai-iex_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5250ai-iex:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5250ai-t-iex_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5250ai-t-iex:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5250ai-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5250ai-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5250ai_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5250ai:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5450a-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.0
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5450a-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5450a_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.0
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5450a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5450ai-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.0
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5450ai-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_ia5450ai_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.0
|
||
OR
|
||
cpe:2.3:h:moxa:nport_ia5450ai:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_iaw5000a-i\/o_firmware:*:*:*:*:*:*:*:* versions up to (including) 2.2
|
||
OR
|
||
cpe:2.3:h:moxa:nport_iaw5000a-i\/o:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_p5150a-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.6
|
||
OR
|
||
cpe:2.3:h:moxa:nport_p5150a-t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:moxa:nport_p5150a_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.6
|
||
OR
|
||
cpe:2.3:h:moxa:nport_p5150a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="col-lg-3 col-md-5 col-sm-12">
|
||
|
||
<div class="bs-callout bs-callout-info">
|
||
<h4>Quick Info</h4>
|
||
<strong>CVE Dictionary Entry:</strong><br/> <a
|
||
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
|
||
href="https://cve.org/CVERecord?id=CVE-2023-4929">CVE-2023-4929</a><br/> <strong>NVD
|
||
Published Date:</strong><br/> <span
|
||
data-testid="vuln-published-on">10/03/2023</span><br/> <strong>NVD
|
||
Last Modified:</strong><br/> <span
|
||
data-testid="vuln-last-modified-on">11/21/2024</span><br/> <strong>
|
||
Source:</strong><br/> <span
|
||
data-testid="vuln-current-description-source">Moxa Inc.</span><br/>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</td>
|
||
</tr>
|
||
</table>
|
||
|
||
</div>
|
||
<!-- Hidden input for padding -->
|
||
<input type="hidden" value="RytbUJnu3lu8UnHjcTDJHy8bUzZKYbns9xZGBRKPqeu5O4EKndYt61olTffncbD4aOf9ZkJblvfXGPzoJsyLvd7hJPXQhiBBzKqHT9G1O8W84kXNpEAA7M1N3GbMBI5GDeNPlHLwWHsWbyUZyHwnALht3sCSSH0aeotdMyh2obXknRObcqn8KCPnjd1bhuKVsgR8ji3MOc1rsXTeXatXj5X7zxNOTGut7PABNom6X2bynXHQa36wLehUoc0d7lGSxiqOu2HXfokIOmsL1O8p3pNixiwKDSkv6aT2wKi2oBdXUNtMwJSVt1P2lOfVZaXhLxKm6byKneds96FVFrwx7VvdZNRT9P3c27r0C6VwHj6dHenrsuwN1cuJwr3DYIT52n24Yin4TK0pXUSTBtAXFqulVYzmyxoErLJCi" id="padding" name="padding"/>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</main>
|
||
<footer id="footer" role="contentinfo">
|
||
<div class="container">
|
||
|
||
<div class="row">
|
||
<div class="col-sm-12">
|
||
<ul class="social-list pull-right">
|
||
<li class="field-item service-twitter list-horiz"><a
|
||
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span>
|
||
</a></li>
|
||
<li class="field-item service-facebook list-horiz"><a
|
||
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-linkedin list-horiz"><a
|
||
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-youtube list-horiz"><a
|
||
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-rss list-horiz"><a
|
||
href="https://www.nist.gov/news-events/nist-rss-feeds"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
|
||
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
|
||
</a></li>
|
||
<li class="field-item service-govdelivery list-horiz last"><a
|
||
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
|
||
<i class="fa fa-envelope fa-fw"><span
|
||
class="element-invisible">govdelivery</span></i><span class="ext"><span
|
||
class="element-invisible"> (link is external)</span></span>
|
||
</a></li>
|
||
</ul>
|
||
<span class="hidden-xs"> <a
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
<div class="row hidden-sm hidden-md hidden-lg">
|
||
<div class="col-sm-12">
|
||
<a href="https://www.nist.gov"
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row footer-contact-container">
|
||
<div class="col-sm-6">
|
||
<strong>HEADQUARTERS</strong>
|
||
<br>
|
||
100 Bureau Drive
|
||
<br>
|
||
Gaithersburg, MD 20899
|
||
<br>
|
||
<a href="tel:301-975-2000">(301) 975-2000</a>
|
||
<br>
|
||
<br>
|
||
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
|
||
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
|
||
| <a href="https://www.nist.gov/about-nist/visit"
|
||
style="display: inline-block;">Our Other Offices</a>
|
||
</div>
|
||
<div class="col-sm-6">
|
||
<div class="pull-right"
|
||
style="text-align:right">
|
||
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
|
||
<br>
|
||
US-CERT Security Operations Center
|
||
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
|
||
<br> Phone: 1-888-282-0870
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row">
|
||
<nav title="Footer Navigation" role="navigation"
|
||
class="row footer-bottom-links-container">
|
||
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
|
||
<p>
|
||
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
||
|
|
||
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
||
|
|
||
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
||
|
|
||
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/foia">FOIA</a>
|
||
|
|
||
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
||
|
|
||
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
||
|
|
||
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
||
|
|
||
<a href="https://www.science.gov/">Science.gov</a>
|
||
|
|
||
<a href="https://www.usa.gov/">USA.gov</a>
|
||
</p>
|
||
</nav>
|
||
</div>
|
||
</div>
|
||
</footer>
|
||
</body>
|
||
</html>
|
||
|
||
|