10836 lines
1 MiB
10836 lines
1 MiB
<!DOCTYPE html>
|
||
|
||
<html lang="en">
|
||
<head>
|
||
|
||
|
||
|
||
<title>NVD - CVE-2024-48870</title>
|
||
|
||
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
|
||
<meta http-equiv="content-style-type" content="text/css" />
|
||
<meta http-equiv="content-script-type" content="text/javascript" />
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||
|
||
|
||
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link
|
||
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
|
||
|
||
<link href="/site-media/css/nist-fonts.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/base-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/media-resize.css" type="text/css"
|
||
rel="stylesheet" />
|
||
|
||
|
||
<meta name="theme-color" content="#000000">
|
||
|
||
|
||
<script src="/site-scripts/jquery/dist/jquery.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/underscore/underscore-min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/bootstrap/js/bootstrap.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/moment/min/moment.min.js"
|
||
type="text/javascript"></script>
|
||
<script
|
||
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
|
||
type="text/javascript"></script>
|
||
|
||
|
||
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
|
||
<script src="/site-media/js/nist-exit-script.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/forms.js" type="text/javascript"></script>
|
||
|
||
<script
|
||
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true"
|
||
type="text/javascript" id="_fed_an_js_tag"></script>
|
||
|
||
<!-- Google tag (gtag.js) -->
|
||
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
|
||
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
|
||
|
||
|
||
<style id="antiClickjack">
|
||
body>* {
|
||
display: none !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: block !important;
|
||
}
|
||
</style>
|
||
<noscript>
|
||
<style id="antiClickjackNoScript">
|
||
body>* {
|
||
display: block !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: none !important;
|
||
}
|
||
</style>
|
||
</noscript>
|
||
<script type="text/javascript" id="antiClickjackScript">
|
||
if (self === top) {
|
||
// no clickjacking
|
||
var antiClickjack = document.getElementById("antiClickjack");
|
||
antiClickjack.parentNode.removeChild(antiClickjack);
|
||
} else {
|
||
setTimeout(tryForward(), 5000);
|
||
}
|
||
|
||
function tryForward() {
|
||
top.location = self.location;
|
||
}
|
||
</script>
|
||
<meta charset="UTF-8">
|
||
|
||
<link href="/site-media/css/nvd-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/images/favicons/apple-touch-icon.png"
|
||
rel="apple-touch-icon" type="image/png" sizes="180x180" />
|
||
<link href="/site-media/images/favicons/favicon-32x32.png"
|
||
rel="icon" type="image/png" sizes="32x32" />
|
||
<link href="/site-media/images/favicons/favicon-16x16.png"
|
||
rel="icon" type="image/png" sizes="16x16" />
|
||
<link href="/site-media/images/favicons/manifest.json"
|
||
rel="manifest" />
|
||
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
|
||
rel="mask-icon" color="#000000" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" />
|
||
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" type="image/x-icon" />
|
||
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
|
||
type="image/x-icon" />
|
||
<meta charset="UTF-8">
|
||
<script src="/site-media/js/vulnerability/vulnDetail.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
|
||
type="text/javascript"></script>
|
||
|
||
</head>
|
||
<body>
|
||
<header role="banner" title="Site Banner">
|
||
<div id="antiClickjack" style="display: none">
|
||
<h1>You are viewing this page in an unauthorized frame window.</h1>
|
||
<p>
|
||
This is a potential security issue, you are being redirected to
|
||
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
|
||
</p>
|
||
</div>
|
||
<div>
|
||
<section class="usa-banner" aria-label="Official government website">
|
||
<div class="usa-accordion container">
|
||
<header class="usa-banner__header">
|
||
<noscript>
|
||
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
|
||
</noscript>
|
||
<img class="usa-banner__header-flag"
|
||
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
|
||
|
||
<span class="usa-banner__header-text">An official website of the United States government</span>
|
||
|
||
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
|
||
<span class="usa-banner__button-text">Here's how you know</span>
|
||
</button>
|
||
</header>
|
||
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
|
||
<div class="row">
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Official websites use .gov</strong>
|
||
<br>
|
||
A <strong>.gov</strong> website belongs to an official government organization in the United States.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Secure .gov websites use HTTPS</strong>
|
||
<br>
|
||
A <strong>lock</strong> (<img class="usa-banner__lock"
|
||
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
</div>
|
||
<div>
|
||
<div>
|
||
<nav id="navbar" class="navbar">
|
||
<div id="nist-menu-container" class="container">
|
||
<div class="row">
|
||
<!-- Brand -->
|
||
<div class="col-xs-6 col-md-4 navbar-header"
|
||
style="height:104px">
|
||
<a class="navbar-brand"
|
||
href="https://www.nist.gov"
|
||
target="_blank" rel="noopener noreferrer"
|
||
id="navbar-brand-image"
|
||
style="padding-top: 36px">
|
||
|
||
<img alt="National Institute of Standards and Technology"
|
||
src="/site-media/images/nist/nist-logo.svg"
|
||
width="110" height="30">
|
||
</a>
|
||
</div>
|
||
<div class="col-xs-6 col-md-8 navbar-nist-logo">
|
||
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
|
||
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
|
||
class="hidden-xxs">NVD </span>MENU</span>
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="main-menu-row container">
|
||
<!-- Collect the nav links, forms, and other content for toggling -->
|
||
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
|
||
<ul>
|
||
|
||
<li><a href="/general"> General <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-general"
|
||
data-expander-name="general" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="general">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/nvd-dashboard">NVD Dashboard</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/faq">FAQ</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/visualizations">Visualizations</a>
|
||
</p>
|
||
<p>
|
||
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln"> Vulnerabilities <span
|
||
class="expander fa fa-plus"
|
||
id="nvd-header-menu-vulnerabilities"
|
||
data-expander-name="vulnerabilities" data-expanded="false">
|
||
<span class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="vulnerabilities">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Search & Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/categories">Weakness Types</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/vendor-comments">Vendor Comments</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/cvmap">CVMAP</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-metrics"
|
||
data-expander-name="metrics" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="metrics">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
|
||
Calculator</a>
|
||
</p>
|
||
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/products"> Products <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-products"
|
||
data-expander-name="products" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="products">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe">CPE Dictionary</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/statistics">CPE Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/swid">SWID</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4"></div>
|
||
</div>
|
||
</div></li>
|
||
<li>
|
||
<a href="/developers">Developers<span
|
||
class="expander fa fa-plus" id="nvd-header-menu-developers"
|
||
data-expander-name="developers" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="developers">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/start-here">Start Here</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/request-an-api-key">Request an API Key</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/vulnerabilities">Vulnerabilities</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/products">Products</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/data-sources">Data Sources</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/terms-of-use">Terms of Use</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</li>
|
||
<li><a href="/contact"> Contact NVD </a></li>
|
||
<li><a href="/other"> Other Sites <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-othersites"
|
||
data-expander-name="otherSites" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="otherSites">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
|
||
Validated Tools</a>
|
||
</p>
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
<li><a href="/search"> Search <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-search"
|
||
data-expander-name="search" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="search">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Vulnerability Search</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
|
||
|
||
|
||
</ul>
|
||
</div>
|
||
<!-- /#mobile-nav-container -->
|
||
</div>
|
||
|
||
</nav>
|
||
<section id="itl-header" class="has-menu">
|
||
<div class="container">
|
||
<div class="row">
|
||
<div class="col-sm-12 col-md-8">
|
||
<h2 class="hidden-xs hidden-sm">
|
||
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
|
||
</h2>
|
||
<h1 class="hidden-xs hidden-sm">
|
||
<a id="nvd-header-link"
|
||
href="/">National Vulnerability Database</a>
|
||
</h1>
|
||
<h1 class="hidden-xs text-center hidden-md hidden-lg"
|
||
>National Vulnerability Database</h1>
|
||
<h1 class="hidden-sm hidden-md hidden-lg text-center"
|
||
>NVD</h1>
|
||
|
||
</div>
|
||
<div class="col-sm-12 col-md-4">
|
||
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
|
||
<img id="img-logo-nvd-lg"
|
||
alt="National Vulnerability Database"
|
||
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
|
||
width="500" height="100">
|
||
</a>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
|
||
|
||
</div>
|
||
</div>
|
||
</header>
|
||
<main>
|
||
<div>
|
||
<div id="body-section" class="container">
|
||
<div class="row">
|
||
<ol class="breadcrumb">
|
||
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
|
||
</ol>
|
||
</div>
|
||
<div>
|
||
<style>
|
||
/* wrap the words for CVSS v4 */
|
||
#nistv4Metric {
|
||
word-wrap: break-word;
|
||
}
|
||
</style>
|
||
|
||
<script>
|
||
/*<![CDATA[*/
|
||
var vuln = {
|
||
nistV4Present: false,
|
||
cnaV4Present: false,
|
||
nistV3Present: true,
|
||
cnaV3Present: true,
|
||
nistV2Present: false,
|
||
cnaV2Present: false
|
||
};
|
||
/*]]>*/
|
||
</script>
|
||
|
||
|
||
<div>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
|
||
<div id="vulnDetailPanel">
|
||
<table id="vulnDetailTableView" style="border-collapse: collapse;">
|
||
<tr>
|
||
<td colspan="2">
|
||
|
||
<h2 data-testid="page-header">
|
||
<i class="fa fa-bug fa-flip-vertical"></i><span
|
||
data-testid="page-header-vuln-id">CVE-2024-48870</span>
|
||
Detail
|
||
</h2>
|
||
|
||
|
||
|
||
<div class="row">
|
||
<div class="col-lg-9 col-md-7 col-sm-12">
|
||
|
||
|
||
<h3 id="vulnDescriptionTitle"
|
||
data-testid="vuln-description-title">Description </h3>
|
||
|
||
<p data-testid="vuln-description">Sharp and Toshiba Tec MFPs improperly validate input data in URI data registration, resulting in a stored cross-site scripting vulnerability.
|
||
If crafted input is stored by an administrative user, malicious script may be executed on the web browsers of other victim users.</p><br/>
|
||
|
||
|
||
|
||
|
||
|
||
<!-- CVSS Severity and Vector Strings -->
|
||
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
|
||
class="row bs-callout bs-callout-success cvssVulnDetail">
|
||
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
|
||
 
|
||
<div id="cvssVulnDetailBtn" class="btn-group">
|
||
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 4.0
|
||
</button>
|
||
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 3.x
|
||
</button>
|
||
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 2.0
|
||
</button>
|
||
</div>
|
||
|
||
|
||
<div id="cvssEnrichmentNotes">
|
||
<i>
|
||
<small>
|
||
NVD enrichment efforts reference publicly available information to associate
|
||
vector strings. CVSS information contributed by other sources is also
|
||
displayed.
|
||
</small>
|
||
</i>
|
||
</div>
|
||
|
||
<!-- CVSS v4.0 -->
|
||
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
|
||
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss4-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong> </strong><span
|
||
class="severityDetail"> <a
|
||
id="Cvss4NistCalculatorAnchorNA"
|
||
class="label label-default"
|
||
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
|
||
<span> <span
|
||
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV4MetricHidden"
|
||
value=""/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
<!-- CVSS V3.x -->
|
||
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 3.x Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3NistCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2024-48870&vector=AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N&version=3.1&source=NIST"
|
||
data-testid="vuln-cvss3-panel-score"
|
||
class="label label-warning">4.8 MEDIUM</a>
|
||
</span></span>
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss3-nist-vector"
|
||
class="tooltipCvss3NistMetrics">CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N</span></span>
|
||
<input type="hidden"
|
||
id="nistV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>4.8 </span><span data-testid='vuln-cvssv3-base-score-severity'>MEDIUM</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 2.7 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 1.7 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Network </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> Low </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> High </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> Required </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Changed </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> Low </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> Low </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> None </span> </p> </span> "/>
|
||
|
||
</div>
|
||
|
||
|
||
</div>
|
||
<!-- CNA -->
|
||
<div class="row no-gutters">
|
||
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div id="v3CnaIconReference">
|
||
<img src="/site-media/images/NVD_Reference_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="Nist CVSS score does not match with CNA score">
|
||
|
||
</div>
|
||
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>CNA:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-cna">JPCERT/CC</span>
|
||
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3CnaCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2024-48870&vector=AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N&version=3.1&source=JPCERT/CC"
|
||
data-testid="vuln-cvss3-cna-panel-score"
|
||
class="label label-warning">6.2 MEDIUM</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong> <span
|
||
data-testid="vuln-cvss3-cna-vector"
|
||
class="tooltipCvss3CnaMetrics">CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N</span></span>
|
||
<input type="hidden" id="cnaV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>6.2 </span><span data-testid='vuln-cvssv3-base-score-severity'>MEDIUM</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 4.0 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 1.7 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Network </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> Low </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> High </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> Required </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Changed </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> High </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> None </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> None </span> </p> </span> "/>
|
||
</div>
|
||
</div>
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
|
||
<!-- CVSS V2.0 -->
|
||
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="National Institute of Standards and Technology">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span
|
||
data-testid="vuln-cvss2-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"><a
|
||
id="Cvss2CalculatorAnchorNA" class="label label-default"
|
||
data-testid="vuln-cvss2-panel-score-na"
|
||
href=''>N/A</a></span></span>
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><span
|
||
data-testid="vuln-cvss2-panel-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV2MetricHidden"
|
||
value=""/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="row col-sm-12">
|
||
|
||
|
||
|
||
<div id="vulnHyperlinksPanel">
|
||
<h3>References to Advisories, Solutions, and Tools</h3>
|
||
<p>
|
||
By selecting these links, you will be leaving NIST webspace.
|
||
We have provided these links to other web sites because they
|
||
may have information that would be of interest to you. No
|
||
inferences should be drawn on account of other sites being
|
||
referenced, or not, from this page. There may be other web
|
||
sites that are more appropriate for your purpose. NIST does
|
||
not necessarily endorse the views expressed, or concur with
|
||
the facts presented on these sites. Further, NIST does not
|
||
endorse any commercial products that may be mentioned on
|
||
these sites. Please address comments about this page to <a
|
||
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
|
||
</p>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-hyperlinks-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Hyperlink</th>
|
||
<th>Resource</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-0">
|
||
<td data-testid="vuln-hyperlinks-link-0">
|
||
<a
|
||
href="https://global.sharp/products/copier/info/info_security_2024-10.html"
|
||
target="_blank" rel="noopener noreferrer">https://global.sharp/products/copier/info/info_security_2024-10.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-0">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-1">
|
||
<td data-testid="vuln-hyperlinks-link-1">
|
||
<a
|
||
href="https://jvn.jp/en/vu/JVNVU95063136/"
|
||
target="_blank" rel="noopener noreferrer">https://jvn.jp/en/vu/JVNVU95063136/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-1">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-2">
|
||
<td data-testid="vuln-hyperlinks-link-2">
|
||
<a
|
||
href="https://www.toshibatec.com/information/20241025_01.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.toshibatec.com/information/20241025_01.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-2">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
|
||
data-testid="vuln-technical-details-container">
|
||
<h3>Weakness Enumeration</h3>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-CWEs-table">
|
||
<thead>
|
||
<tr>
|
||
<th>CWE-ID</th>
|
||
<th>CWE Name</th>
|
||
<th>Source</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-CWEs-row-0">
|
||
<td data-testid="vuln-CWEs-link-0">
|
||
<a href="http://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noopener noreferrer">CWE-79</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-0">Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-0">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
|
||
>
|
||
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cweNvdIcon"
|
||
alt="cwe source acceptance level">
|
||
|
||
<span>NIST </span>
|
||
</span><span class="cweSource" data-testid="vuln-cwes-assigner-0-1"
|
||
>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
<span>JPCERT/CC </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
</div>
|
||
|
||
|
||
<div>
|
||
<h3>
|
||
Known Affected Software Configurations <small> <a
|
||
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
|
||
to CPE 2.2</a></small>
|
||
</h3>
|
||
<span id="vulnConfigurationsArea"></span>
|
||
<input type="hidden" id="cveIdHidden" value="CVE-2024-48870"/>
|
||
|
||
<div>
|
||
|
||
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
|
||
<div id="vulnCpeTree" style="display: none;"></div>
|
||
<input type="hidden"
|
||
id="InputRestBasePath"
|
||
value="/rest/public">
|
||
<input type="hidden" id="cveTreeJsonDataHidden" value="[{"id":1,"dataTestId":"vuln-software-config-1","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-1-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-1-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Atoshibatec%3Ae-studio1058_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:toshibatec:e-studio1058_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:toshibatec:e-studio1058_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-0-0","id":"13393046","matchCpes":[],"rangeDescription":" versions up to (including) t1.01.h4.00 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"t1.01.h4.00","rangeId":"673102","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-1-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Atoshibatec%3Ae-studio1058%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:toshibatec:e-studio1058:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:toshibatec:e-studio1058:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-0","id":"13393047","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":2,"dataTestId":"vuln-software-config-2","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-2-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Atoshibatec%3Ae-studio1208_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:toshibatec:e-studio1208_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:toshibatec:e-studio1208_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-0","id":"13393048","matchCpes":[],"rangeDescription":" versions up to (including) t1.01.h4.00 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"t1.01.h4.00","rangeId":"673103","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Atoshibatec%3Ae-studio1208%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:toshibatec:e-studio1208:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:toshibatec:e-studio1208:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-0","id":"13393049","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":3,"dataTestId":"vuln-software-config-3","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-3-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Atoshibatec%3Ae-studio908_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:toshibatec:e-studio908_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:toshibatec:e-studio908_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-0","id":"13393058","matchCpes":[],"rangeDescription":" versions up to (including) t2.12.h3.00 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"t2.12.h3.00","rangeId":"673104","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Atoshibatec%3Ae-studio908%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:toshibatec:e-studio908:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:toshibatec:e-studio908:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-0","id":"13393059","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":4,"dataTestId":"vuln-software-config-4","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-4-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-4-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-90c70_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-90c70_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-90c70_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-0-0","id":"13393060","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-4-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-90c70%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-90c70:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-90c70:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-0","id":"13393061","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":5,"dataTestId":"vuln-software-config-5","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-5-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-90c80_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-90c80_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-90c80_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-0","id":"13393062","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-90c80%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-90c80:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-90c80:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-0","id":"13393063","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":6,"dataTestId":"vuln-software-config-6","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-6-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-6-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-70c65_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-70c65_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-0-0","id":"13393064","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-6-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-70c65%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-70c65:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-70c65:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-1-0","id":"13393065","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":7,"dataTestId":"vuln-software-config-7","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-7-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-7-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-70c55_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-70c55_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-7-0-0-0","id":"13393066","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-7-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-70c55%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-70c55:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-70c55:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-7-0-1-0","id":"13393067","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":8,"dataTestId":"vuln-software-config-8","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-8-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-8-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-70c45_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-70c45_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-0-0","id":"13393068","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-8-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-70c45%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-70c45:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-70c45:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-1-0","id":"13393069","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":9,"dataTestId":"vuln-software-config-9","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-9-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-9-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-70c36_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-70c36_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-0-0","id":"13393070","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-9-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-70c36%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-70c36:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-70c36:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-1-0","id":"13393071","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":10,"dataTestId":"vuln-software-config-10","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-10-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-10-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-70c31_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-70c31_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-0","id":"13393072","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-10-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-70c31%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-70c31:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-70c31:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-1-0","id":"13393073","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":11,"dataTestId":"vuln-software-config-11","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-11-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-11-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-60c45_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-60c45_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-0-0","id":"13393074","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-11-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-60c45%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-60c45:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-60c45:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-1-0","id":"13393075","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":12,"dataTestId":"vuln-software-config-12","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-12-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-12-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-60c36_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-60c36_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-12-0-0-0","id":"13393076","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-12-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-60c36%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-60c36:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-60c36:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-12-0-1-0","id":"13393077","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":13,"dataTestId":"vuln-software-config-13","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-13-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-13-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-60c31_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-60c31_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-13-0-0-0","id":"13393078","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-13-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-60c31%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-60c31:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-60c31:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-13-0-1-0","id":"13392769","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":14,"dataTestId":"vuln-software-config-14","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-14-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-14-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-50c65_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-50c65_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-14-0-0-0","id":"13392770","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-14-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-50c65%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-50c65:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-50c65:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-14-0-1-0","id":"13392771","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":15,"dataTestId":"vuln-software-config-15","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-15-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-15-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-50c55_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-50c55_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-15-0-0-0","id":"13392772","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-15-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-50c55%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-50c55:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-50c55:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-15-0-1-0","id":"13392773","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":16,"dataTestId":"vuln-software-config-16","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-16-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-16-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-50c45_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-50c45_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-16-0-0-0","id":"13392774","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-16-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-50c45%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-50c45:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-50c45:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-16-0-1-0","id":"13392775","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":17,"dataTestId":"vuln-software-config-17","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-17-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-17-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-50c36_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-50c36_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-17-0-0-0","id":"13392776","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-17-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-50c36%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-50c36:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-50c36:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-17-0-1-0","id":"13392777","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":18,"dataTestId":"vuln-software-config-18","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-18-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-18-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-50c31_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-50c31_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-18-0-0-0","id":"13392778","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-18-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-50c31%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-50c31:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-50c31:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-18-0-1-0","id":"13392609","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":19,"dataTestId":"vuln-software-config-19","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-19-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-19-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-50c26_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-50c26_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-19-0-0-0","id":"13392610","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-19-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-50c26%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-50c26:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-50c26:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-19-0-1-0","id":"13392611","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":20,"dataTestId":"vuln-software-config-20","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-20-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-20-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-55c26_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-55c26_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-20-0-0-0","id":"13392612","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-20-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-55c26%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-55c26:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-55c26:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-20-0-1-0","id":"13392613","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":21,"dataTestId":"vuln-software-config-21","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-21-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-21-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-8081_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-8081_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-21-0-0-0","id":"13392614","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-21-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-8081%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-8081:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-8081:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-21-0-1-0","id":"13392615","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":22,"dataTestId":"vuln-software-config-22","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-22-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-22-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-7081_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-7081_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-22-0-0-0","id":"13392616","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-22-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-7081%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-7081:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-7081:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-22-0-1-0","id":"13392617","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":23,"dataTestId":"vuln-software-config-23","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-23-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-23-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-6071_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-6071_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-23-0-0-0","id":"13392618","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-23-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-6071%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-6071:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-6071:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-23-0-1-0","id":"13392619","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":24,"dataTestId":"vuln-software-config-24","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-24-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-24-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-5071_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-5071_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-24-0-0-0","id":"13392792","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-24-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-5071%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-5071:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-5071:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-24-0-1-0","id":"13392793","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":25,"dataTestId":"vuln-software-config-25","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-25-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-25-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4071_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4071_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-25-0-0-0","id":"13392794","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-25-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4071%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4071:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4071:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-25-0-1-0","id":"13392795","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":26,"dataTestId":"vuln-software-config-26","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-26-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-26-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3571_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3571_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-26-0-0-0","id":"13392796","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-26-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3571%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3571:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3571:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-26-0-1-0","id":"13392797","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":27,"dataTestId":"vuln-software-config-27","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-27-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-27-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3071_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3071_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-27-0-0-0","id":"13393132","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-27-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3071%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3071:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3071:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-27-0-1-0","id":"13393133","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":28,"dataTestId":"vuln-software-config-28","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-28-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-28-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4061_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4061_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-28-0-0-0","id":"13393134","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-28-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4061%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4061:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4061:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-28-0-1-0","id":"13393135","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":29,"dataTestId":"vuln-software-config-29","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-29-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-29-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3561_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3561_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-29-0-0-0","id":"13393136","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-29-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3561%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3561:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3561:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-29-0-1-0","id":"13393137","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":30,"dataTestId":"vuln-software-config-30","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-30-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-30-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3061_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3061_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-30-0-0-0","id":"13393138","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-30-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3061%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3061:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3061:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-30-0-1-0","id":"13393139","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":31,"dataTestId":"vuln-software-config-31","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-31-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-31-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-6051_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-6051_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-31-0-0-0","id":"13393140","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-31-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-6051%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-6051:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-6051:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-31-0-1-0","id":"13393141","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":32,"dataTestId":"vuln-software-config-32","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-32-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-32-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-5051_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-5051_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-32-0-0-0","id":"13393142","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-32-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-5051%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-5051:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-5051:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-32-0-1-0","id":"13393143","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":33,"dataTestId":"vuln-software-config-33","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-33-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-33-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4051_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4051_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-33-0-0-0","id":"13393144","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-33-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4051%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4051:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4051:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-33-0-1-0","id":"13393145","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":34,"dataTestId":"vuln-software-config-34","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-34-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-34-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3551_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3551_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-34-0-0-0","id":"13393146","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-34-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3551%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3551:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3551:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-34-0-1-0","id":"13393147","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":35,"dataTestId":"vuln-software-config-35","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-35-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-35-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3051_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3051_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-35-0-0-0","id":"13393148","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-35-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3051%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3051:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3051:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-35-0-1-0","id":"13393149","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":36,"dataTestId":"vuln-software-config-36","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-36-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-36-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2651_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2651_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-36-0-0-0","id":"13392818","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-36-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2651%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2651:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2651:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-36-0-1-0","id":"13392819","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":37,"dataTestId":"vuln-software-config-37","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-37-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-37-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-6071s_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-6071s_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-37-0-0-0","id":"13392820","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-37-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-6071s%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-6071s:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-6071s:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-37-0-1-0","id":"13392821","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":38,"dataTestId":"vuln-software-config-38","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-38-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-38-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-5071s_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-5071s_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-38-0-0-0","id":"13392822","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-38-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-5071s%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-5071s:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-5071s:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-38-0-1-0","id":"13392823","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":39,"dataTestId":"vuln-software-config-39","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-39-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-39-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4071s_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4071s_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-39-0-0-0","id":"13392824","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-39-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4071s%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4071s:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4071s:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-39-0-1-0","id":"13392825","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":40,"dataTestId":"vuln-software-config-40","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-40-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-40-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3571s_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3571s_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-40-0-0-0","id":"13392826","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-40-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3571s%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3571s:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3571s:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-40-0-1-0","id":"13392827","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":41,"dataTestId":"vuln-software-config-41","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-41-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-41-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3071s_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3071s_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-41-0-0-0","id":"13392828","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-41-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3071s%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3071s:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3071s:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-41-0-1-0","id":"13392829","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":42,"dataTestId":"vuln-software-config-42","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-42-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-42-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4061s_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4061s_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-42-0-0-0","id":"13392830","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-42-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4061s%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4061s:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4061s:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-42-0-1-0","id":"13392831","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":43,"dataTestId":"vuln-software-config-43","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-43-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-43-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3561s_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3561s_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-43-0-0-0","id":"13392832","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-43-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3561s%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3561s:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3561s:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-43-0-1-0","id":"13392833","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":44,"dataTestId":"vuln-software-config-44","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-44-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-44-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3061s_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3061s_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-44-0-0-0","id":"13392834","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-44-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3061s%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3061s:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3061s:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-44-0-1-0","id":"13392835","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":45,"dataTestId":"vuln-software-config-45","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-45-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-45-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-30c25_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-30c25_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-45-0-0-0","id":"13392836","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-45-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-30c25%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-30c25:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-30c25:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-45-0-1-0","id":"13392837","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":46,"dataTestId":"vuln-software-config-46","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-46-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-46-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-30c25y_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-30c25y_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-46-0-0-0","id":"13392838","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-46-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-30c25y%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-30c25y:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-30c25y:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-46-0-1-0","id":"13392839","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":47,"dataTestId":"vuln-software-config-47","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-47-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-47-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-30c25z_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-30c25z_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-47-0-0-0","id":"13392840","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-47-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-30c25z%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-30c25z:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-30c25z:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-47-0-1-0","id":"13392841","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":48,"dataTestId":"vuln-software-config-48","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-48-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-48-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-30c25t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-30c25t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-48-0-0-0","id":"13392882","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-48-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-30c25t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-30c25t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-30c25t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-48-0-1-0","id":"13392883","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":49,"dataTestId":"vuln-software-config-49","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-49-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-49-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-7580n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-7580n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-49-0-0-0","id":"13392884","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-49-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-7580n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-7580n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-7580n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-49-0-1-0","id":"13392885","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":50,"dataTestId":"vuln-software-config-50","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-50-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-50-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-6580n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-6580n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-50-0-0-0","id":"13392886","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-50-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-6580n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-6580n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-6580n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-50-0-1-0","id":"13392887","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":51,"dataTestId":"vuln-software-config-51","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-51-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-51-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-8090n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-8090n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-51-0-0-0","id":"13392734","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-51-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-8090n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-8090n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-8090n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-51-0-1-0","id":"13392735","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":52,"dataTestId":"vuln-software-config-52","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-52-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-52-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-7090n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-7090n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-52-0-0-0","id":"13392736","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-52-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-7090n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-7090n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-7090n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-52-0-1-0","id":"13392737","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":53,"dataTestId":"vuln-software-config-53","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-53-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-53-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-6070n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-6070n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-53-0-0-0","id":"13392738","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-53-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-6070n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-6070n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-6070n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-53-0-1-0","id":"13392739","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":54,"dataTestId":"vuln-software-config-54","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-54-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-54-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-5070n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-5070n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-54-0-0-0","id":"13392740","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-54-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-5070n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-5070n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-5070n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-54-0-1-0","id":"13392741","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":55,"dataTestId":"vuln-software-config-55","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-55-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-55-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4070n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4070n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-55-0-0-0","id":"13392742","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-55-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4070n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4070n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4070n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-55-0-1-0","id":"13392743","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":56,"dataTestId":"vuln-software-config-56","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-56-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-56-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3570n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3570n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-56-0-0-0","id":"13392542","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-56-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3570n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3570n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3570n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-56-0-1-0","id":"13392543","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":57,"dataTestId":"vuln-software-config-57","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-57-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-57-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3070n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3070n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-57-0-0-0","id":"13392544","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-57-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3070n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3070n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3070n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-57-0-1-0","id":"13392545","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":58,"dataTestId":"vuln-software-config-58","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-58-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-58-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4060n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4060n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-58-0-0-0","id":"13392546","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-58-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4060n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4060n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4060n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-58-0-1-0","id":"13392547","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":59,"dataTestId":"vuln-software-config-59","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-59-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-59-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3560n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3560n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-59-0-0-0","id":"13392548","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-59-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3560n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3560n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3560n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-59-0-1-0","id":"13392549","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":60,"dataTestId":"vuln-software-config-60","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-60-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-60-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3060n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3060n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-60-0-0-0","id":"13392550","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-60-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3060n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3060n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3060n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-60-0-1-0","id":"13392551","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":61,"dataTestId":"vuln-software-config-61","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-61-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-61-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-6070v_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-6070v_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-61-0-0-0","id":"13392552","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-61-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-6070v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-6070v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-6070v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-61-0-1-0","id":"13392553","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":62,"dataTestId":"vuln-software-config-62","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-62-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-62-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-5070v_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-5070v_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-62-0-0-0","id":"13392554","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-62-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-5070v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-5070v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-5070v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-62-0-1-0","id":"13392555","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":63,"dataTestId":"vuln-software-config-63","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-63-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-63-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4070v_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4070v_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-63-0-0-0","id":"13392556","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-63-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4070v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4070v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4070v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-63-0-1-0","id":"13392557","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":64,"dataTestId":"vuln-software-config-64","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-64-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-64-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3570v_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3570v_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-64-0-0-0","id":"13392558","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-64-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3570v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3570v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3570v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-64-0-1-0","id":"13392559","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":65,"dataTestId":"vuln-software-config-65","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-65-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-65-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3070v_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3070v_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-65-0-0-0","id":"13392560","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-65-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3070v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3070v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3070v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-65-0-1-0","id":"13392561","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":66,"dataTestId":"vuln-software-config-66","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-66-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-66-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4060v_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4060v_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-66-0-0-0","id":"13392842","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-66-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4060v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4060v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4060v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-66-0-1-0","id":"13392843","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":67,"dataTestId":"vuln-software-config-67","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-67-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-67-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3560v_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3560v_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-67-0-0-0","id":"13392844","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-67-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3560v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3560v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3560v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-67-0-1-0","id":"13392845","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":68,"dataTestId":"vuln-software-config-68","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-68-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-68-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3060v_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3060v_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-68-0-0-0","id":"13392846","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-68-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3060v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3060v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3060v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-68-0-1-0","id":"13392847","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":69,"dataTestId":"vuln-software-config-69","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-69-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-69-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-6070n_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-6070n_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-69-0-0-0","id":"13392848","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-69-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-6070n_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-6070n_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-6070n_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-69-0-1-0","id":"13392599","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":70,"dataTestId":"vuln-software-config-70","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-70-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-70-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4070n_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4070n_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-70-0-0-0","id":"13392600","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-70-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4070n_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4070n_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4070n_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-70-0-1-0","id":"13392601","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":71,"dataTestId":"vuln-software-config-71","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-71-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-71-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3070n_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3070n_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-71-0-0-0","id":"13392602","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-71-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3070n_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3070n_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3070n_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-71-0-1-0","id":"13392603","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":72,"dataTestId":"vuln-software-config-72","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-72-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-72-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-6070v_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-6070v_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-72-0-0-0","id":"13392604","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-72-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-6070v_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-6070v_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-6070v_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-72-0-1-0","id":"13392605","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":73,"dataTestId":"vuln-software-config-73","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-73-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-73-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4070v_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4070v_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-73-0-0-0","id":"13392606","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-73-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4070v_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4070v_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4070v_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-73-0-1-0","id":"13392607","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":74,"dataTestId":"vuln-software-config-74","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-74-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-74-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3070v_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3070v_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-74-0-0-0","id":"13392608","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-74-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3070v_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3070v_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3070v_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-74-0-1-0","id":"13392519","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":75,"dataTestId":"vuln-software-config-75","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-75-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-75-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-6050n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-6050n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-75-0-0-0","id":"13393050","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-75-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-6050n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-6050n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-6050n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-75-0-1-0","id":"13393051","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":76,"dataTestId":"vuln-software-config-76","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-76-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-76-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-5050n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-5050n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-76-0-0-0","id":"13393086","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-76-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-5050n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-5050n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-5050n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-76-0-1-0","id":"13393087","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":77,"dataTestId":"vuln-software-config-77","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-77-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-77-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4050n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4050n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-77-0-0-0","id":"13393088","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-77-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4050n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4050n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4050n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-77-0-1-0","id":"13393089","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":78,"dataTestId":"vuln-software-config-78","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-78-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-78-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3550n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3550n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-78-0-0-0","id":"13393090","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-78-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3550n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3550n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3550n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-78-0-1-0","id":"13393091","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":79,"dataTestId":"vuln-software-config-79","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-79-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-79-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3050n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3050n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-79-0-0-0","id":"13393092","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-79-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3050n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3050n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3050n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-79-0-1-0","id":"13393093","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":80,"dataTestId":"vuln-software-config-80","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-80-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-80-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-6050v_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-6050v_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-80-0-0-0","id":"13393094","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-80-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-6050v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-6050v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-6050v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-80-0-1-0","id":"13393095","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":81,"dataTestId":"vuln-software-config-81","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-81-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-81-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-5050v_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-5050v_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-81-0-0-0","id":"13393096","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-81-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-5050v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-5050v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-5050v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-81-0-1-0","id":"13393097","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":82,"dataTestId":"vuln-software-config-82","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-82-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-82-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4050v_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4050v_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-82-0-0-0","id":"13393098","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-82-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4050v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4050v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4050v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-82-0-1-0","id":"13393099","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":83,"dataTestId":"vuln-software-config-83","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-83-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-83-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3550v_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3550v_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-83-0-0-0","id":"13393100","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-83-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3550v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3550v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3550v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-83-0-1-0","id":"13393101","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":84,"dataTestId":"vuln-software-config-84","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-84-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-84-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3050v_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3050v_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-84-0-0-0","id":"13393102","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-84-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3050v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3050v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3050v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-84-0-1-0","id":"13393103","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":85,"dataTestId":"vuln-software-config-85","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-85-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-85-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2630n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2630n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-85-0-0-0","id":"13393104","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-85-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2630n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2630n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2630n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-85-0-1-0","id":"13393105","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":86,"dataTestId":"vuln-software-config-86","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-86-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-86-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3050n_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3050n_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-86-0-0-0","id":"13393106","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-86-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3050n_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3050n_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3050n_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-86-0-1-0","id":"13393107","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":87,"dataTestId":"vuln-software-config-87","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-87-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-87-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3050v_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3050v_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-87-0-0-0","id":"13393108","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-87-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3050v_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3050v_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3050v_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-87-0-1-0","id":"13393109","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":88,"dataTestId":"vuln-software-config-88","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-88-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-88-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-c545wd_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-c545wd_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-c545wd_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-88-0-0-0","id":"13393110","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-88-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-c545wd%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-c545wd:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-c545wd:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-88-0-1-0","id":"13393111","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":89,"dataTestId":"vuln-software-config-89","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-89-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-89-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-c542wd_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-c542wd_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-c542wd_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-89-0-0-0","id":"13393112","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-89-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-c542wd%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-c542wd:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-c542wd:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-89-0-1-0","id":"13393113","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":90,"dataTestId":"vuln-software-config-90","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-90-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-90-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-c535wd_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-c535wd_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-c535wd_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-90-0-0-0","id":"13393114","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-90-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-c535wd%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-c535wd:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-c535wd:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-90-0-1-0","id":"13393115","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":91,"dataTestId":"vuln-software-config-91","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-91-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-91-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-c533wd_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-c533wd_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-c533wd_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-91-0-0-0","id":"13393116","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-91-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-c533wd%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-c533wd:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-c533wd:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-91-0-1-0","id":"13393117","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":92,"dataTestId":"vuln-software-config-92","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-92-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-92-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-c535wr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-c535wr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-c535wr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-92-0-0-0","id":"13393118","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-92-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-c535wr%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-c535wr:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-c535wr:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-92-0-1-0","id":"13393119","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":93,"dataTestId":"vuln-software-config-93","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-93-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-93-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-c533wr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-c533wr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-c533wr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-93-0-0-0","id":"13393120","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-93-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-c533wr%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-c533wr:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-c533wr:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-93-0-1-0","id":"13393121","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":94,"dataTestId":"vuln-software-config-94","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-94-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-94-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c304w_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c304w_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-94-0-0-0","id":"13393122","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-94-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c304w%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c304w:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c304w:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-94-0-1-0","id":"13393123","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":95,"dataTestId":"vuln-software-config-95","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-95-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-95-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c303w_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c303w_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-95-0-0-0","id":"13393124","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-95-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c303w%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c303w:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c303w:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-95-0-1-0","id":"13393125","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":96,"dataTestId":"vuln-software-config-96","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-96-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-96-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c304_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c304_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-96-0-0-0","id":"13392686","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-96-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c304%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c304:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c304:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-96-0-1-0","id":"13392687","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":97,"dataTestId":"vuln-software-config-97","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-97-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-97-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c303_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c303_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-97-0-0-0","id":"13392688","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-97-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c303%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c303:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c303:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-97-0-1-0","id":"13393079","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":98,"dataTestId":"vuln-software-config-98","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-98-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-98-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c304wh_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c304wh_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-98-0-0-0","id":"13393080","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-98-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c304wh%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c304wh:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c304wh:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-98-0-1-0","id":"13393081","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":99,"dataTestId":"vuln-software-config-99","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-99-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-99-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c303wh_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c303wh_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-99-0-0-0","id":"13392798","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-99-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c303wh%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c303wh:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c303wh:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-99-0-1-0","id":"13392799","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":100,"dataTestId":"vuln-software-config-100","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-100-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-100-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-70m90_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-70m90_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-100-0-0-0","id":"13392800","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-100-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-70m90%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-70m90:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-70m90:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-100-0-1-0","id":"13392801","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":101,"dataTestId":"vuln-software-config-101","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-101-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-101-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-70m75_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-70m75_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-101-0-0-0","id":"13392802","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-101-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-70m75%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-70m75:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-70m75:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-101-0-1-0","id":"13392803","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":102,"dataTestId":"vuln-software-config-102","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-102-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-102-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-70m65_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-70m65_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-102-0-0-0","id":"13392804","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-102-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-70m65%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-70m65:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-70m65:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-102-0-1-0","id":"13392805","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":103,"dataTestId":"vuln-software-config-103","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-103-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-103-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-70m55_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-70m55_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-103-0-0-0","id":"13392806","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-103-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-70m55%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-70m55:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-70m55:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-103-0-1-0","id":"13392807","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":104,"dataTestId":"vuln-software-config-104","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-104-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-104-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-70m45_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-70m45_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-104-0-0-0","id":"13392808","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-104-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-70m45%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-70m45:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-70m45:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-104-0-1-0","id":"13392809","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":105,"dataTestId":"vuln-software-config-105","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-105-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-105-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-70m36_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-70m36_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-105-0-0-0","id":"13392810","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-105-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-70m36%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-70m36:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-70m36:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-105-0-1-0","id":"13392811","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":106,"dataTestId":"vuln-software-config-106","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-106-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-106-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-70m31_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-70m31_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-106-0-0-0","id":"13392812","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-106-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-70m31%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-70m31:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-70m31:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-106-0-1-0","id":"13392813","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":107,"dataTestId":"vuln-software-config-107","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-107-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-107-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-50m55_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-50m55_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-107-0-0-0","id":"13392814","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-107-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-50m55%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-50m55:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-50m55:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-107-0-1-0","id":"13392815","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":108,"dataTestId":"vuln-software-config-108","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-108-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-108-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-50m50_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-50m50_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-108-0-0-0","id":"13392816","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-108-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-50m50%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-50m50:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-50m50:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-108-0-1-0","id":"13392817","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":109,"dataTestId":"vuln-software-config-109","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-109-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-109-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-50m45_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-50m45_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-109-0-0-0","id":"13392860","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-109-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-50m45%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-50m45:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-50m45:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-109-0-1-0","id":"13392861","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":110,"dataTestId":"vuln-software-config-110","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-110-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-110-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-50m36_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-50m36_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-110-0-0-0","id":"13392862","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-110-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-50m36%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-50m36:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-50m36:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-110-0-1-0","id":"13392863","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":111,"dataTestId":"vuln-software-config-111","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-111-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-111-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-50m31_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-50m31_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-111-0-0-0","id":"13392864","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-111-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-50m31%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-50m31:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-50m31:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-111-0-1-0","id":"13392865","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":112,"dataTestId":"vuln-software-config-112","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-112-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-112-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-50m26_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-50m26_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-112-0-0-0","id":"13392866","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-112-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-50m26%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-50m26:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-50m26:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-112-0-1-0","id":"13392867","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":113,"dataTestId":"vuln-software-config-113","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-113-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-113-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m1206_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m1206_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-113-0-0-0","id":"13392868","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-113-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m1206%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m1206:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m1206:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-113-0-1-0","id":"13392869","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":114,"dataTestId":"vuln-software-config-114","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-114-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-114-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m1056_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m1056_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-114-0-0-0","id":"13392870","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-114-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m1056%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m1056:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m1056:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-114-0-1-0","id":"13392871","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":115,"dataTestId":"vuln-software-config-115","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-115-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-115-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m7570_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m7570_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-115-0-0-0","id":"13392872","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-115-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m7570%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m7570:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m7570:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-115-0-1-0","id":"13392873","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":116,"dataTestId":"vuln-software-config-116","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-116-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-116-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m6570_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m6570_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-116-0-0-0","id":"13392874","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-116-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m6570%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m6570:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m6570:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-116-0-1-0","id":"13392875","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":117,"dataTestId":"vuln-software-config-117","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-117-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-117-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m6071_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m6071_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-117-0-0-0","id":"13392876","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-117-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m6071%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m6071:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m6071:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-117-0-1-0","id":"13392877","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":118,"dataTestId":"vuln-software-config-118","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-118-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-118-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m5071_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m5071_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-118-0-0-0","id":"13392878","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-118-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m5071%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m5071:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m5071:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-118-0-1-0","id":"13392879","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":119,"dataTestId":"vuln-software-config-119","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-119-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-119-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m4071_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m4071_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-119-0-0-0","id":"13392880","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-119-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m4071%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m4071:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m4071:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-119-0-1-0","id":"13392881","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":120,"dataTestId":"vuln-software-config-120","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-120-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-120-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m3571_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m3571_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-120-0-0-0","id":"13392932","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-120-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m3571%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m3571:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m3571:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-120-0-1-0","id":"13392933","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":121,"dataTestId":"vuln-software-config-121","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-121-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-121-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m3071_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m3071_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-121-0-0-0","id":"13392934","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-121-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m3071%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m3071:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m3071:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-121-0-1-0","id":"13392935","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":122,"dataTestId":"vuln-software-config-122","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-122-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-122-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m6051_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m6051_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-122-0-0-0","id":"13392936","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-122-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m6051%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m6051:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m6051:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-122-0-1-0","id":"13392937","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":123,"dataTestId":"vuln-software-config-123","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-123-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-123-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m5051_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m5051_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-123-0-0-0","id":"13392888","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-123-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m5051%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m5051:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m5051:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-123-0-1-0","id":"13392889","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":124,"dataTestId":"vuln-software-config-124","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-124-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-124-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m4051_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m4051_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-124-0-0-0","id":"13392890","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-124-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m4051%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m4051:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m4051:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-124-0-1-0","id":"13392891","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":125,"dataTestId":"vuln-software-config-125","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-125-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-125-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m3551_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m3551_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-125-0-0-0","id":"13392892","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-125-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m3551%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m3551:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m3551:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-125-0-1-0","id":"13392893","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":126,"dataTestId":"vuln-software-config-126","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-126-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-126-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m3051_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m3051_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-126-0-0-0","id":"13392894","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-126-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m3051%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m3051:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m3051:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-126-0-1-0","id":"13392895","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":127,"dataTestId":"vuln-software-config-127","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-127-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-127-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m2651_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m2651_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-127-0-0-0","id":"13392896","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-127-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m2651%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m2651:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m2651:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-127-0-1-0","id":"13392897","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":128,"dataTestId":"vuln-software-config-128","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-128-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-128-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m3571s_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m3571s_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-128-0-0-0","id":"13392898","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-128-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m3571s%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m3571s:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m3571s:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-128-0-1-0","id":"13392899","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":129,"dataTestId":"vuln-software-config-129","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-129-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-129-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m3071s_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m3071s_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-129-0-0-0","id":"13392900","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-129-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m3071s%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m3071s:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m3071s:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-129-0-1-0","id":"13392901","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":130,"dataTestId":"vuln-software-config-130","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-130-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-130-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m6071s_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m6071s_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-130-0-0-0","id":"13392902","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-130-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m6071s%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m6071s:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m6071s:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-130-0-1-0","id":"13392903","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":131,"dataTestId":"vuln-software-config-131","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-131-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-131-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m5071s_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m5071s_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-131-0-0-0","id":"13392904","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-131-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m5071s%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m5071s:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m5071s:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-131-0-1-0","id":"13392905","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":132,"dataTestId":"vuln-software-config-132","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-132-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-132-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m4071s_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m4071s_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-132-0-0-0","id":"13392906","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-132-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m4071s%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m4071s:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m4071s:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-132-0-1-0","id":"13392907","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":133,"dataTestId":"vuln-software-config-133","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-133-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-133-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-30m35_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-30m35_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-133-0-0-0","id":"13392908","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-133-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-30m35%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-30m35:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-30m35:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-133-0-1-0","id":"13392909","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":134,"dataTestId":"vuln-software-config-134","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-134-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-134-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-30m31_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-30m31_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-134-0-0-0","id":"13392910","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-134-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-30m31%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-30m31:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-30m31:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-134-0-1-0","id":"13392911","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":135,"dataTestId":"vuln-software-config-135","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-135-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-135-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-30m28_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-30m28_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-135-0-0-0","id":"13392912","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-135-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-30m28%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-30m28:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-30m28:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-135-0-1-0","id":"13392913","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":136,"dataTestId":"vuln-software-config-136","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-136-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-136-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-30m35t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-30m35t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-136-0-0-0","id":"13392914","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-136-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-30m35t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-30m35t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-30m35t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-136-0-1-0","id":"13392915","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":137,"dataTestId":"vuln-software-config-137","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-137-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-137-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-30m31t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-30m31t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-137-0-0-0","id":"13392916","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-137-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-30m31t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-30m31t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-30m31t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-137-0-1-0","id":"13392917","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":138,"dataTestId":"vuln-software-config-138","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-138-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-138-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-30m28t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-30m28t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-138-0-0-0","id":"13392918","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-138-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-30m28t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-30m28t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-30m28t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-138-0-1-0","id":"13392919","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":139,"dataTestId":"vuln-software-config-139","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-139-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-139-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b476w_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b476w_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-139-0-0-0","id":"13392920","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-139-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b476w%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b476w:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b476w:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-139-0-1-0","id":"13392921","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":140,"dataTestId":"vuln-software-config-140","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-140-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-140-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b376w_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b376w_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-140-0-0-0","id":"13392922","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-140-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b376w%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b376w:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b376w:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-140-0-1-0","id":"13392923","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":141,"dataTestId":"vuln-software-config-141","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-141-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-141-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b456w_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b456w_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-141-0-0-0","id":"13392992","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-141-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b456w%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b456w:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b456w:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-141-0-1-0","id":"13392993","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":142,"dataTestId":"vuln-software-config-142","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-142-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-142-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b356w_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b356w_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-142-0-0-0","id":"13392994","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-142-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b356w%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b356w:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b356w:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-142-0-1-0","id":"13392995","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":143,"dataTestId":"vuln-software-config-143","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-143-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-143-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b476wh_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b476wh_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-143-0-0-0","id":"13392996","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-143-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b476wh%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b476wh:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b476wh:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-143-0-1-0","id":"13392997","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":144,"dataTestId":"vuln-software-config-144","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-144-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-144-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b376wh_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b376wh_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-144-0-0-0","id":"13392980","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-144-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b376wh%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b376wh:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b376wh:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-144-0-1-0","id":"13392981","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":145,"dataTestId":"vuln-software-config-145","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-145-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-145-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b456wh_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b456wh_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-145-0-0-0","id":"13392982","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-145-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b456wh%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b456wh:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b456wh:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-145-0-1-0","id":"13392983","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":146,"dataTestId":"vuln-software-config-146","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-146-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-146-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b356wh_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b356wh_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-146-0-0-0","id":"13392984","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-146-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b356wh%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b356wh:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b356wh:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-146-0-1-0","id":"13392985","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":147,"dataTestId":"vuln-software-config-147","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-147-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-147-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m905_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m905_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-147-0-0-0","id":"13392520","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-147-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m905%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m905:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m905:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-147-0-1-0","id":"13392521","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":148,"dataTestId":"vuln-software-config-148","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-148-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-148-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m6070_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m6070_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-148-0-0-0","id":"13392522","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-148-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m6070%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m6070:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m6070:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-148-0-1-0","id":"13392523","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":149,"dataTestId":"vuln-software-config-149","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-149-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-149-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m5070_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m5070_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-149-0-0-0","id":"13392524","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-149-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m5070%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m5070:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m5070:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-149-0-1-0","id":"13392525","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":150,"dataTestId":"vuln-software-config-150","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-150-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-150-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m4070_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m4070_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-150-0-0-0","id":"13392526","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-150-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m4070%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m4070:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m4070:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-150-0-1-0","id":"13392527","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":151,"dataTestId":"vuln-software-config-151","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-151-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-151-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m3570_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m3570_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-151-0-0-0","id":"13392528","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-151-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m3570%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m3570:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m3570:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-151-0-1-0","id":"13392529","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":152,"dataTestId":"vuln-software-config-152","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-152-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-152-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m3070_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m3070_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-152-0-0-0","id":"13392530","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-152-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m3070%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m3070:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m3070:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-152-0-1-0","id":"13392531","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":153,"dataTestId":"vuln-software-config-153","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-153-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-153-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m6050_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m6050_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-153-0-0-0","id":"13392532","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-153-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m6050%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m6050:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m6050:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-153-0-1-0","id":"13392533","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":154,"dataTestId":"vuln-software-config-154","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-154-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-154-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m5050_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m5050_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-154-0-0-0","id":"13392534","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-154-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m5050%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m5050:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m5050:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-154-0-1-0","id":"13392535","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":155,"dataTestId":"vuln-software-config-155","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-155-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-155-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m4050_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m4050_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-155-0-0-0","id":"13392536","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-155-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m4050%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m4050:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m4050:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-155-0-1-0","id":"13392537","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":156,"dataTestId":"vuln-software-config-156","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-156-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-156-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m3550_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m3550_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-156-0-0-0","id":"13392538","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-156-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m3550%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m3550:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m3550:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-156-0-1-0","id":"13392539","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":157,"dataTestId":"vuln-software-config-157","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-157-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-157-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m3050_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m3050_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-157-0-0-0","id":"13392540","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-157-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m3050%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m3050:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m3050:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-157-0-1-0","id":"13392541","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":158,"dataTestId":"vuln-software-config-158","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-158-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-158-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m2630_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m2630_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-158-0-0-0","id":"13392924","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-158-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m2630%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m2630:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m2630:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-158-0-1-0","id":"13392925","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":159,"dataTestId":"vuln-software-config-159","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-159-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-159-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m6070_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m6070_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-159-0-0-0","id":"13392926","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-159-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m6070_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m6070_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m6070_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-159-0-1-0","id":"13392927","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":160,"dataTestId":"vuln-software-config-160","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-160-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-160-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m4070_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m4070_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-160-0-0-0","id":"13392928","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-160-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m4070_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m4070_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m4070_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-160-0-1-0","id":"13392929","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":161,"dataTestId":"vuln-software-config-161","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-161-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-161-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m3070_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m3070_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-161-0-0-0","id":"13392930","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-161-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m3070_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m3070_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m3070_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-161-0-1-0","id":"13392931","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":162,"dataTestId":"vuln-software-config-162","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-162-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-162-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m3050_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m3050_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-162-0-0-0","id":"13392998","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-162-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m3050_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m3050_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m3050_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-162-0-1-0","id":"13392999","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":163,"dataTestId":"vuln-software-config-163","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-163-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-163-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m2630_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m2630_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-163-0-0-0","id":"13393000","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-163-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m2630_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m2630_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m2630_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-163-0-1-0","id":"13393001","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":164,"dataTestId":"vuln-software-config-164","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-164-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-164-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-b550wd_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-b550wd_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-b550wd_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-164-0-0-0","id":"13393002","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-164-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-b550wd%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-b550wd:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-b550wd:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-164-0-1-0","id":"13393003","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":165,"dataTestId":"vuln-software-config-165","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-165-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-165-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-b540wr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-b540wr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-b540wr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-165-0-0-0","id":"13393004","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-165-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-b540wr%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-b540wr:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-b540wr:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-165-0-1-0","id":"13393005","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":166,"dataTestId":"vuln-software-config-166","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-166-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-166-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-b547wd_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-b547wd_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-b547wd_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-166-0-0-0","id":"13393006","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-166-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-b547wd%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-b547wd:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-b547wd:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-166-0-1-0","id":"13393007","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":167,"dataTestId":"vuln-software-config-167","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-167-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-167-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Abp-b537wr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:bp-b537wr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:bp-b537wr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-167-0-0-0","id":"13393008","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-167-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Abp-b537wr%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:bp-b537wr:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:bp-b537wr:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-167-0-1-0","id":"13393009","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":168,"dataTestId":"vuln-software-config-168","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-168-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-168-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b455w_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b455w_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-168-0-0-0","id":"13393010","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-168-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b455w%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b455w:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b455w:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-168-0-1-0","id":"13393011","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":169,"dataTestId":"vuln-software-config-169","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-169-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-169-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b355w_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b355w_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-169-0-0-0","id":"13393012","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-169-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b355w%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b355w:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b355w:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-169-0-1-0","id":"13393013","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":170,"dataTestId":"vuln-software-config-170","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-170-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-170-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b455wz_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b455wz_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-170-0-0-0","id":"13393014","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-170-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b455wz%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b455wz:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b455wz:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-170-0-1-0","id":"13393015","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":171,"dataTestId":"vuln-software-config-171","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-171-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-171-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b355wz_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b355wz_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-171-0-0-0","id":"13393082","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-171-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b355wz%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b355wz:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b355wz:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-171-0-1-0","id":"13393083","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":172,"dataTestId":"vuln-software-config-172","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-172-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-172-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b455wt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b455wt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-172-0-0-0","id":"13393084","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-172-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b455wt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b455wt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b455wt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-172-0-1-0","id":"13393085","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":173,"dataTestId":"vuln-software-config-173","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-173-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-173-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b355wt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b355wt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-173-0-0-0","id":"13392744","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-173-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b355wt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b355wt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b355wt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-173-0-1-0","id":"13392745","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":174,"dataTestId":"vuln-software-config-174","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-174-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-174-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-7500n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-7500n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-7500n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-174-0-0-0","id":"13392746","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-174-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-7500n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-7500n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-7500n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-174-0-1-0","id":"13392747","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":175,"dataTestId":"vuln-software-config-175","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-175-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-175-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-6500n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-6500n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-6500n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-175-0-0-0","id":"13392748","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-175-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-6500n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-6500n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-6500n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-175-0-1-0","id":"13392749","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":176,"dataTestId":"vuln-software-config-176","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-176-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-176-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-7040n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-7040n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-7040n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-176-0-0-0","id":"13392750","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-176-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-7040n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-7040n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-7040n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-176-0-1-0","id":"13392751","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":177,"dataTestId":"vuln-software-config-177","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-177-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-177-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-6240n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-6240n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-6240n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-177-0-0-0","id":"13392752","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-177-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-6240n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-6240n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-6240n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-177-0-1-0","id":"13392753","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":178,"dataTestId":"vuln-software-config-178","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-178-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-178-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-5141n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-5141n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-5141n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-178-0-0-0","id":"13392754","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-178-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-5141n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-5141n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-5141n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-178-0-1-0","id":"13392755","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":179,"dataTestId":"vuln-software-config-179","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-179-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-179-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-5140n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-5140n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-5140n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-179-0-0-0","id":"13392756","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-179-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-5140n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-5140n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-5140n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-179-0-1-0","id":"13392757","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":180,"dataTestId":"vuln-software-config-180","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-180-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-180-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4141n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4141n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4141n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-180-0-0-0","id":"13392758","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-180-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4141n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4141n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4141n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-180-0-1-0","id":"13392759","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":181,"dataTestId":"vuln-software-config-181","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-181-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-181-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4140n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4140n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4140n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-181-0-0-0","id":"13392760","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-181-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4140n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4140n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4140n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-181-0-1-0","id":"13392761","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":182,"dataTestId":"vuln-software-config-182","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-182-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-182-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-5141n_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-5141n_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-5141n_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-182-0-0-0","id":"13392762","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-182-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-5141n_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-5141n_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-5141n_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-182-0-1-0","id":"13392763","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":183,"dataTestId":"vuln-software-config-183","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-183-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-183-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4140n_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4140n_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4140n_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-183-0-0-0","id":"13392764","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-183-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4140n_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4140n_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4140n_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-183-0-1-0","id":"13392765","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":184,"dataTestId":"vuln-software-config-184","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-184-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-184-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3640n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3640n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3640n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-184-0-0-0","id":"13392766","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-184-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3640n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3640n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3640n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-184-0-1-0","id":"13392767","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":185,"dataTestId":"vuln-software-config-185","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-185-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-185-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3140n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3140n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3140n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-185-0-0-0","id":"13392768","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-185-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3140n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3140n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3140n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-185-0-1-0","id":"13392779","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":186,"dataTestId":"vuln-software-config-186","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-186-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-186-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2640n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2640n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2640n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-186-0-0-0","id":"13392780","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-186-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2640n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2640n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2640n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-186-0-1-0","id":"13392781","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":187,"dataTestId":"vuln-software-config-187","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-187-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-187-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3140n_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3140n_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3140n_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-187-0-0-0","id":"13392782","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-187-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3140n_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3140n_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3140n_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-187-0-1-0","id":"13392783","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":188,"dataTestId":"vuln-software-config-188","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-188-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-188-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3640nr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3640nr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3640nr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-188-0-0-0","id":"13392784","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-188-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3640nr%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3640nr:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3640nr:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-188-0-1-0","id":"13392785","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":189,"dataTestId":"vuln-software-config-189","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-189-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-189-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3140nr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3140nr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3140nr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-189-0-0-0","id":"13392786","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-189-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3140nr%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3140nr:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3140nr:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-189-0-1-0","id":"13392787","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":190,"dataTestId":"vuln-software-config-190","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-190-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-190-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2640nr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2640nr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2640nr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-190-0-0-0","id":"13392788","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-190-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2640nr%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2640nr:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2640nr:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-190-0-1-0","id":"13392789","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":191,"dataTestId":"vuln-software-config-191","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-191-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-191-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3116n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3116n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3116n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-191-0-0-0","id":"13392790","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-191-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3116n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3116n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3116n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-191-0-1-0","id":"13392791","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":192,"dataTestId":"vuln-software-config-192","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-192-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-192-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2616n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2616n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2616n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-192-0-0-0","id":"13392562","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-192-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2616n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2616n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2616n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-192-0-1-0","id":"13392563","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":193,"dataTestId":"vuln-software-config-193","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-193-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-193-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3115n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3115n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3115n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-193-0-0-0","id":"13392564","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-193-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3115n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3115n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3115n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-193-0-1-0","id":"13392565","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":194,"dataTestId":"vuln-software-config-194","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-194-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-194-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2615n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2615n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2615n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-194-0-0-0","id":"13392566","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-194-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2615n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2615n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2615n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-194-0-1-0","id":"13392567","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":195,"dataTestId":"vuln-software-config-195","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-195-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-195-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2615_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2615_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2615_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-195-0-0-0","id":"13392938","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-195-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2615_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2615_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2615_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-195-0-1-0","id":"13392939","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":196,"dataTestId":"vuln-software-config-196","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-196-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-196-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-5112n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-5112n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-5112n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-196-0-0-0","id":"13392940","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-196-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-5112n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-5112n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-5112n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-196-0-1-0","id":"13392941","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":197,"dataTestId":"vuln-software-config-197","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-197-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-197-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-5111n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-5111n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-5111n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-197-0-0-0","id":"13392942","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-197-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-5111n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-5111n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-5111n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-197-0-1-0","id":"13392943","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":198,"dataTestId":"vuln-software-config-198","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-198-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-198-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-5110n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-5110n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-5110n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-198-0-0-0","id":"13392944","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-198-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-5110n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-5110n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-5110n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-198-0-1-0","id":"13392945","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":199,"dataTestId":"vuln-software-config-199","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-199-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-199-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4112n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4112n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4112n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-199-0-0-0","id":"13392946","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-199-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4112n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4112n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4112n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-199-0-1-0","id":"13392947","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":200,"dataTestId":"vuln-software-config-200","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-200-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-200-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4111n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4111n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4111n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-200-0-0-0","id":"13392948","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-200-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4111n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4111n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4111n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-200-0-1-0","id":"13392949","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":201,"dataTestId":"vuln-software-config-201","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-201-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-201-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4110n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4110n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4110n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-201-0-0-0","id":"13392950","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-201-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4110n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4110n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4110n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-201-0-1-0","id":"13392951","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":202,"dataTestId":"vuln-software-config-202","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-202-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-202-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3610n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3610n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3610n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-202-0-0-0","id":"13392952","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-202-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3610n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3610n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3610n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-202-0-1-0","id":"13392953","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":203,"dataTestId":"vuln-software-config-203","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-203-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-203-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3110n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3110n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3110n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-203-0-0-0","id":"13392954","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-203-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3110n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3110n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3110n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-203-0-1-0","id":"13392955","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":204,"dataTestId":"vuln-software-config-204","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-204-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-204-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2610n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2610n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2610n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-204-0-0-0","id":"13392956","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-204-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2610n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2610n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2610n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-204-0-1-0","id":"13392957","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":205,"dataTestId":"vuln-software-config-205","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-205-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-205-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3110n_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3110n_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3110n_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-205-0-0-0","id":"13392958","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-205-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3110n_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3110n_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3110n_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-205-0-1-0","id":"13392959","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":206,"dataTestId":"vuln-software-config-206","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-206-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-206-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3610nr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3610nr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3610nr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-206-0-0-0","id":"13392960","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-206-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3610nr%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3610nr:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3610nr:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-206-0-1-0","id":"13392961","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":207,"dataTestId":"vuln-software-config-207","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-207-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-207-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c301w_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c301w_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c301w_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-207-0-0-0","id":"13392962","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-207-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c301w%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c301w:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c301w:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-207-0-1-0","id":"13392963","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":208,"dataTestId":"vuln-software-config-208","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-208-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-208-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c301_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c301_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c301_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-208-0-0-0","id":"13392964","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-208-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c301%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c301:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c301:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-208-0-1-0","id":"13392965","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":209,"dataTestId":"vuln-software-config-209","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-209-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-209-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3114n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3114n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3114n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-209-0-0-0","id":"13392966","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-209-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3114n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3114n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3114n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-209-0-1-0","id":"13392967","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":210,"dataTestId":"vuln-software-config-210","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-210-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-210-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2614n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2614n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2614n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-210-0-0-0","id":"13392968","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-210-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2614n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2614n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2614n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-210-0-1-0","id":"13392969","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":211,"dataTestId":"vuln-software-config-211","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-211-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-211-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2314n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2314n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2314n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-211-0-0-0","id":"13392970","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-211-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2314n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2314n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2314n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-211-0-1-0","id":"13392971","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":212,"dataTestId":"vuln-software-config-212","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-212-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-212-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2314nr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2314nr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2314nr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-212-0-0-0","id":"13392972","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-212-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2314nr%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2314nr:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2314nr:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-212-0-1-0","id":"13392973","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":213,"dataTestId":"vuln-software-config-213","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-213-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-213-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3111u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3111u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3111u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-213-0-0-0","id":"13392974","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-213-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3111u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3111u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3111u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-213-0-1-0","id":"13392975","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":214,"dataTestId":"vuln-software-config-214","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-214-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-214-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2310u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2310u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2310u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-214-0-0-0","id":"13392976","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-214-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2310u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2310u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2310u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-214-0-1-0","id":"13392977","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":215,"dataTestId":"vuln-software-config-215","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-215-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-215-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2310r_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2310r_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2310r_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-215-0-0-0","id":"13392978","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-215-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2310r%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2310r:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2310r:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-215-0-1-0","id":"13392979","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":216,"dataTestId":"vuln-software-config-216","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-216-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-216-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2010u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2010u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2010u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-216-0-0-0","id":"13392620","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-216-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2010u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2010u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2010u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-216-0-1-0","id":"13392621","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":217,"dataTestId":"vuln-software-config-217","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-217-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-217-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-1810u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-1810u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-1810u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-217-0-0-0","id":"13392622","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-217-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-1810u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-1810u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-1810u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-217-0-1-0","id":"13392623","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":218,"dataTestId":"vuln-software-config-218","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-218-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-218-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c401_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c401_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c401_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-218-0-0-0","id":"13392624","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-218-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c401%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c401:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c401:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-218-0-1-0","id":"13392625","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":219,"dataTestId":"vuln-software-config-219","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-219-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-219-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Adx-c401_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:dx-c401_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:dx-c401_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-219-0-0-0","id":"13392986","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-219-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Adx-c401%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:dx-c401:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:dx-c401:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-219-0-1-0","id":"13392987","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":220,"dataTestId":"vuln-software-config-220","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-220-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-220-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Adx-c401_j_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:dx-c401_j_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:dx-c401_j_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-220-0-0-0","id":"13392988","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-220-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Adx-c401_j%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:dx-c401_j:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:dx-c401_j:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-220-0-1-0","id":"13392989","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":221,"dataTestId":"vuln-software-config-221","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-221-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-221-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c400_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c400_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c400_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-221-0-0-0","id":"13392990","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-221-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c400%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c400:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c400:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-221-0-1-0","id":"13392991","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":222,"dataTestId":"vuln-software-config-222","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-222-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-222-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Adx-c400_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:dx-c400_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:dx-c400_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-222-0-0-0","id":"13392632","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-222-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Adx-c400%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:dx-c400:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:dx-c400:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-222-0-1-0","id":"13392633","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":223,"dataTestId":"vuln-software-config-223","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-223-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-223-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c381_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c381_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c381_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-223-0-0-0","id":"13392634","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-223-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c381%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c381:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c381:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-223-0-1-0","id":"13392635","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":224,"dataTestId":"vuln-software-config-224","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-224-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-224-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Adx-c381_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:dx-c381_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:dx-c381_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-224-0-0-0","id":"13392636","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-224-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Adx-c381%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:dx-c381:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:dx-c381:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-224-0-1-0","id":"13392637","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":225,"dataTestId":"vuln-software-config-225","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-225-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-225-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c380_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c380_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c380_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-225-0-0-0","id":"13392638","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-225-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c380%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c380:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c380:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-225-0-1-0","id":"13392639","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":226,"dataTestId":"vuln-software-config-226","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-226-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-226-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c381b_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c381b_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c381b_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-226-0-0-0","id":"13392640","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-226-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c381b%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c381b:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c381b:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-226-0-1-0","id":"13392641","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":227,"dataTestId":"vuln-software-config-227","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-227-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-227-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c312_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c312_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c312_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-227-0-0-0","id":"13392642","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-227-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c312%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c312:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c312:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-227-0-1-0","id":"13392643","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":228,"dataTestId":"vuln-software-config-228","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-228-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-228-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c311_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c311_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c311_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-228-0-0-0","id":"13392644","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-228-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c311%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c311:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c311:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-228-0-1-0","id":"13392645","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":229,"dataTestId":"vuln-software-config-229","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-229-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-229-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Adx-c311_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:dx-c311_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:dx-c311_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-229-0-0-0","id":"13392646","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-229-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Adx-c311%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:dx-c311:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:dx-c311:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-229-0-1-0","id":"13392647","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":230,"dataTestId":"vuln-software-config-230","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-230-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-230-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Adx-c311j_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:dx-c311j_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:dx-c311j_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-230-0-0-0","id":"13392648","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-230-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Adx-c311j%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:dx-c311j:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:dx-c311j:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-230-0-1-0","id":"13392649","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":231,"dataTestId":"vuln-software-config-231","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-231-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-231-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c310_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c310_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c310_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-231-0-0-0","id":"13392650","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-231-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c310%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c310:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c310:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-231-0-1-0","id":"13392651","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":232,"dataTestId":"vuln-software-config-232","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-232-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-232-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Adx-c310_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:dx-c310_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:dx-c310_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-232-0-0-0","id":"13392652","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-232-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Adx-c310%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:dx-c310:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:dx-c310:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-232-0-1-0","id":"13392653","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":233,"dataTestId":"vuln-software-config-233","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-233-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-233-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c400p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c400p_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c400p_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-233-0-0-0","id":"13392654","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-233-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c400p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c400p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c400p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-233-0-1-0","id":"13392655","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":234,"dataTestId":"vuln-software-config-234","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-234-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-234-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c380p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c380p_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c380p_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-234-0-0-0","id":"13392656","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-234-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c380p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c380p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c380p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-234-0-1-0","id":"13392657","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":235,"dataTestId":"vuln-software-config-235","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-235-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-235-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c402sc_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c402sc_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c402sc_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-235-0-0-0","id":"13392658","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-235-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c402sc%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c402sc:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c402sc:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-235-0-1-0","id":"13392659","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":236,"dataTestId":"vuln-software-config-236","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-236-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-236-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c382sc_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c382sc_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c382sc_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-236-0-0-0","id":"13392660","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-236-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c382sc%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c382sc:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c382sc:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-236-0-1-0","id":"13392661","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":237,"dataTestId":"vuln-software-config-237","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-237-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-237-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-c382scb_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-c382scb_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-c382scb_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-237-0-0-0","id":"13392662","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-237-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-c382scb%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-c382scb:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-c382scb:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-237-0-1-0","id":"13392663","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":238,"dataTestId":"vuln-software-config-238","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-238-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-238-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-5001n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-5001n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-5001n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-238-0-0-0","id":"13392664","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-238-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-5001n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-5001n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-5001n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-238-0-1-0","id":"13392665","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":239,"dataTestId":"vuln-software-config-239","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-239-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-239-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-5000n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-5000n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-5000n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-239-0-0-0","id":"13392666","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-239-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-5000n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-5000n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-5000n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-239-0-1-0","id":"13392667","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":240,"dataTestId":"vuln-software-config-240","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-240-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-240-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4101n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4101n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4101n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-240-0-0-0","id":"13392716","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-240-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4101n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4101n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4101n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-240-0-1-0","id":"13392717","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":241,"dataTestId":"vuln-software-config-241","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-241-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-241-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-4100n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-4100n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-4100n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-241-0-0-0","id":"13392718","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-241-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-4100n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-4100n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-4100n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-241-0-1-0","id":"13392719","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":242,"dataTestId":"vuln-software-config-242","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-242-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-242-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3100n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3100n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3100n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-242-0-0-0","id":"13392720","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-242-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3100n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3100n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3100n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-242-0-1-0","id":"13392721","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":243,"dataTestId":"vuln-software-config-243","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-243-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-243-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3100g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3100g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3100g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-243-0-0-0","id":"13393016","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-243-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3100g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3100g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3100g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-243-0-1-0","id":"13393017","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":244,"dataTestId":"vuln-software-config-244","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-244-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-244-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2600n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2600n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2600n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-244-0-0-0","id":"13393018","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-244-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2600n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2600n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2600n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-244-0-1-0","id":"13393019","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":245,"dataTestId":"vuln-software-config-245","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-245-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-245-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2600g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2600g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2600g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-245-0-0-0","id":"13393020","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-245-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2600g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2600g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2600g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-245-0-1-0","id":"13393021","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":246,"dataTestId":"vuln-software-config-246","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-246-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-246-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-3101n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-3101n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-3101n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-246-0-0-0","id":"13393022","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-246-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-3101n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-3101n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-3101n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-246-0-1-0","id":"13393023","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":247,"dataTestId":"vuln-software-config-247","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-247-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-247-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2601n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2601n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2601n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-247-0-0-0","id":"13393024","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-247-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2601n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2601n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2601n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-247-0-1-0","id":"13393025","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":248,"dataTestId":"vuln-software-config-248","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-248-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-248-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-2301n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-2301n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-2301n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-248-0-0-0","id":"13393026","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-248-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-2301n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-2301n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-2301n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-248-0-1-0","id":"13393027","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":249,"dataTestId":"vuln-software-config-249","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-249-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-249-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Adx-2500n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:dx-2500n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:dx-2500n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-249-0-0-0","id":"13393028","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-249-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Adx-2500n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:dx-2500n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:dx-2500n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-249-0-1-0","id":"13393029","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":250,"dataTestId":"vuln-software-config-250","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-250-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-250-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Adx-2000u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:dx-2000u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:dx-2000u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-250-0-0-0","id":"13393030","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-250-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Adx-2000u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:dx-2000u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:dx-2000u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-250-0-1-0","id":"13393031","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":251,"dataTestId":"vuln-software-config-251","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-251-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-251-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m1205_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m1205_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m1205_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-251-0-0-0","id":"13393032","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-251-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m1205%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m1205:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m1205:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-251-0-1-0","id":"13393033","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":252,"dataTestId":"vuln-software-config-252","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-252-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-252-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m1055_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m1055_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m1055_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-252-0-0-0","id":"13393034","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-252-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m1055%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m1055:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m1055:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-252-0-1-0","id":"13393035","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":253,"dataTestId":"vuln-software-config-253","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-253-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-253-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m1204_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m1204_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m1204_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-253-0-0-0","id":"13393036","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-253-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m1204%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m1204:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m1204:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-253-0-1-0","id":"13393037","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":254,"dataTestId":"vuln-software-config-254","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-254-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-254-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m1054_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m1054_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m1054_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-254-0-0-0","id":"13393038","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-254-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m1054%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m1054:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m1054:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-254-0-1-0","id":"13393039","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":255,"dataTestId":"vuln-software-config-255","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-255-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-255-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m904_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m904_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m904_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-255-0-0-0","id":"13393040","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-255-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m904%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m904:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m904:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-255-0-1-0","id":"13393041","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":256,"dataTestId":"vuln-software-config-256","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-256-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-256-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m754n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m754n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m754n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-256-0-0-0","id":"13393042","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-256-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m754n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m754n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m754n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-256-0-1-0","id":"13393043","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":257,"dataTestId":"vuln-software-config-257","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-257-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-257-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m654n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m654n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m654n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-257-0-0-0","id":"13393044","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-257-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m654n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m654n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m654n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-257-0-1-0","id":"13393045","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":258,"dataTestId":"vuln-software-config-258","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-258-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-258-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m754n_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m754n_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m754n_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-258-0-0-0","id":"13392668","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-258-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m754n_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m754n_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m754n_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-258-0-1-0","id":"13392669","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":259,"dataTestId":"vuln-software-config-259","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-259-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-259-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m654n_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m654n_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m654n_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-259-0-0-0","id":"13392670","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-259-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m654n_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m654n_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m654n_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-259-0-1-0","id":"13392671","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":260,"dataTestId":"vuln-software-config-260","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-260-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-260-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m565n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m565n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m565n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-260-0-0-0","id":"13392672","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-260-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m565n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m565n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m565n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-260-0-1-0","id":"13392673","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":261,"dataTestId":"vuln-software-config-261","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-261-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-261-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m465n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m465n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m465n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-261-0-0-0","id":"13392674","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-261-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m465n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m465n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m465n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-261-0-1-0","id":"13392675","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":262,"dataTestId":"vuln-software-config-262","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-262-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-262-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m365n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m365n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m365n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-262-0-0-0","id":"13392676","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-262-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m365n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m365n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m365n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-262-0-1-0","id":"13392677","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":263,"dataTestId":"vuln-software-config-263","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-263-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-263-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m465n_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m465n_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m465n_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-263-0-0-0","id":"13392678","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-263-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m465n_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m465n_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m465n_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-263-0-1-0","id":"13392679","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":264,"dataTestId":"vuln-software-config-264","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-264-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-264-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m365n_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m365n_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m365n_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-264-0-0-0","id":"13392680","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-264-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m365n_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m365n_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m365n_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-264-0-1-0","id":"13392681","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":265,"dataTestId":"vuln-software-config-265","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-265-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-265-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m564n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m564n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m564n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-265-0-0-0","id":"13392682","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-265-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m564n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m564n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m564n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-265-0-1-0","id":"13392683","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":266,"dataTestId":"vuln-software-config-266","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-266-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-266-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m464n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m464n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m464n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-266-0-0-0","id":"13392684","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-266-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m464n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m464n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m464n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-266-0-1-0","id":"13392685","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":267,"dataTestId":"vuln-software-config-267","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-267-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-267-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m364n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m364n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m364n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-267-0-0-0","id":"13392568","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-267-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m364n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m364n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m364n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-267-0-1-0","id":"13392569","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":268,"dataTestId":"vuln-software-config-268","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-268-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-268-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m564n_a_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m564n_a_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m564n_a_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-268-0-0-0","id":"13392570","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-268-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m564n_a%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m564n_a:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m564n_a:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-268-0-1-0","id":"13392571","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":269,"dataTestId":"vuln-software-config-269","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-269-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-269-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m356n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m356n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m356n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-269-0-0-0","id":"13392572","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-269-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m356n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m356n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m356n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-269-0-1-0","id":"13392573","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":270,"dataTestId":"vuln-software-config-270","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-270-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-270-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m316n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m316n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m316n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-270-0-0-0","id":"13392574","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-270-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m316n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m316n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m316n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-270-0-1-0","id":"13392575","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":271,"dataTestId":"vuln-software-config-271","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-271-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-271-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m315n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m315n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m315n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-271-0-0-0","id":"13392576","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-271-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m315n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m315n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m315n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-271-0-1-0","id":"13392577","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":272,"dataTestId":"vuln-software-config-272","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-272-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-272-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m356u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m356u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m356u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-272-0-0-0","id":"13392578","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-272-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m356u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m356u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m356u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-272-0-1-0","id":"13392579","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":273,"dataTestId":"vuln-software-config-273","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-273-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-273-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m315u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m315u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m315u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-273-0-0-0","id":"13392580","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-273-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m315u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m315u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m315u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-273-0-1-0","id":"13392581","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":274,"dataTestId":"vuln-software-config-274","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-274-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-274-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m266n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m266n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m266n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-274-0-0-0","id":"13392582","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-274-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m266n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m266n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m266n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-274-0-1-0","id":"13392583","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":275,"dataTestId":"vuln-software-config-275","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-275-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-275-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m265n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m265n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m265n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-275-0-0-0","id":"13392584","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-275-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m265n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m265n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m265n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-275-0-1-0","id":"13392585","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":276,"dataTestId":"vuln-software-config-276","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-276-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-276-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m265u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m265u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m265u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-276-0-0-0","id":"13392586","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-276-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m265u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m265u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m265u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-276-0-1-0","id":"13392587","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":277,"dataTestId":"vuln-software-config-277","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-277-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-277-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m315ne_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m315ne_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m315ne_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-277-0-0-0","id":"13392588","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-277-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m315ne%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m315ne:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m315ne:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-277-0-1-0","id":"13392589","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":278,"dataTestId":"vuln-software-config-278","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-278-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-278-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m265ne_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m265ne_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m265ne_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-278-0-0-0","id":"13392590","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-278-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m265ne%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m265ne:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m265ne:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-278-0-1-0","id":"13392591","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":279,"dataTestId":"vuln-software-config-279","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-279-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-279-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m356nv_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m356nv_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m356nv_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-279-0-0-0","id":"13392592","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-279-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m356nv%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m356nv:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m356nv:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-279-0-1-0","id":"13392593","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":280,"dataTestId":"vuln-software-config-280","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-280-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-280-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m316nv_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m316nv_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m316nv_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-280-0-0-0","id":"13392594","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-280-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m316nv%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m316nv:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m316nv:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-280-0-1-0","id":"13392595","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":281,"dataTestId":"vuln-software-config-281","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-281-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-281-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m315nv_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m315nv_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m315nv_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-281-0-0-0","id":"13392596","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-281-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m315nv%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m315nv:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m315nv:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-281-0-1-0","id":"13392597","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":282,"dataTestId":"vuln-software-config-282","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-282-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-282-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m356uv_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m356uv_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m356uv_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-282-0-0-0","id":"13392598","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-282-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m356uv%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m356uv:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m356uv:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-282-0-1-0","id":"13392853","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":283,"dataTestId":"vuln-software-config-283","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-283-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-283-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m315uv_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m315uv_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m315uv_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-283-0-0-0","id":"13392854","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-283-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m315uv%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m315uv:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m315uv:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-283-0-1-0","id":"13392855","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":284,"dataTestId":"vuln-software-config-284","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-284-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-284-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m266nv_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m266nv_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m266nv_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-284-0-0-0","id":"13392856","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-284-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m266nv%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m266nv:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m266nv:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-284-0-1-0","id":"13392857","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":285,"dataTestId":"vuln-software-config-285","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-285-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-285-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m265nv_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m265nv_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m265nv_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-285-0-0-0","id":"13392858","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-285-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m265nv%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m265nv:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m265nv:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-285-0-1-0","id":"13392859","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":286,"dataTestId":"vuln-software-config-286","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-286-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-286-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m265uv_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m265uv_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m265uv_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-286-0-0-0","id":"13392849","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-286-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m265uv%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m265uv:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m265uv:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-286-0-1-0","id":"13392850","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":287,"dataTestId":"vuln-software-config-287","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-287-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-287-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m315v_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m315v_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m315v_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-287-0-0-0","id":"13392851","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-287-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m315v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m315v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m315v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-287-0-1-0","id":"13392852","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":288,"dataTestId":"vuln-software-config-288","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-288-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-288-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m265v_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m265v_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m265v_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-288-0-0-0","id":"13393052","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-288-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m265v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m265v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m265v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-288-0-1-0","id":"13393053","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":289,"dataTestId":"vuln-software-config-289","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-289-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-289-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m354n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m354n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m354n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-289-0-0-0","id":"13393054","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-289-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m354n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m354n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m354n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-289-0-1-0","id":"13393055","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":290,"dataTestId":"vuln-software-config-290","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-290-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-290-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m314n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m314n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m314n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-290-0-0-0","id":"13393056","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-290-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m314n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m314n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m314n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-290-0-1-0","id":"13393057","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":291,"dataTestId":"vuln-software-config-291","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-291-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-291-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m264n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m264n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m264n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-291-0-0-0","id":"13392626","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-291-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m264n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m264n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m264n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-291-0-1-0","id":"13392627","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":292,"dataTestId":"vuln-software-config-292","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-292-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-292-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m354u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m354u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m354u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-292-0-0-0","id":"13392628","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-292-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m354u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m354u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m354u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-292-0-1-0","id":"13392629","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":293,"dataTestId":"vuln-software-config-293","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-293-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-293-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m314u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m314u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m314u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-293-0-0-0","id":"13392630","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-293-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m314u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m314u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m314u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-293-0-1-0","id":"13392631","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":294,"dataTestId":"vuln-software-config-294","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-294-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-294-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m264u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m264u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m264u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-294-0-0-0","id":"13393150","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-294-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m264u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m264u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m264u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-294-0-1-0","id":"13393151","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":295,"dataTestId":"vuln-software-config-295","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-295-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-295-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m314nv_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m314nv_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m314nv_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-295-0-0-0","id":"13393152","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-295-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m314nv%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m314nv:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m314nv:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-295-0-1-0","id":"13393153","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":296,"dataTestId":"vuln-software-config-296","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-296-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-296-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m264nv_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m264nv_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m264nv_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-296-0-0-0","id":"13393154","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-296-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m264nv%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m264nv:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m264nv:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-296-0-1-0","id":"13393155","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":297,"dataTestId":"vuln-software-config-297","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-297-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-297-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m354nr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m354nr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m354nr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-297-0-0-0","id":"13393156","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-297-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m354nr%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m354nr:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m354nr:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-297-0-1-0","id":"13393157","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":298,"dataTestId":"vuln-software-config-298","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-298-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-298-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m314nr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m314nr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m314nr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-298-0-0-0","id":"13393158","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-298-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m314nr%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m314nr:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m314nr:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-298-0-1-0","id":"13392689","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":299,"dataTestId":"vuln-software-config-299","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-299-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-299-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m264nr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m264nr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m264nr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-299-0-0-0","id":"13392690","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-299-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m264nr%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m264nr:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m264nr:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-299-0-1-0","id":"13392691","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":300,"dataTestId":"vuln-software-config-300","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-300-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-300-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b402_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b402_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b402_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-300-0-0-0","id":"13392692","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-300-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b402%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b402:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b402:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-300-0-1-0","id":"13392693","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":301,"dataTestId":"vuln-software-config-301","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-301-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-301-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b382_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b382_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b382_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-301-0-0-0","id":"13392694","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-301-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b382%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b382:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b382:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-301-0-1-0","id":"13392695","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":302,"dataTestId":"vuln-software-config-302","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-302-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-302-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b402p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b402p_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b402p_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-302-0-0-0","id":"13392696","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-302-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b402p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b402p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b402p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-302-0-1-0","id":"13392697","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":303,"dataTestId":"vuln-software-config-303","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-303-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-303-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b382p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b382p_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b382p_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-303-0-0-0","id":"13392698","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-303-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b382p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b382p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b382p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-303-0-1-0","id":"13392699","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":304,"dataTestId":"vuln-software-config-304","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-304-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-304-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b402sc_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b402sc_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b402sc_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-304-0-0-0","id":"13392700","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-304-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b402sc%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b402sc:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b402sc:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-304-0-1-0","id":"13392701","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":305,"dataTestId":"vuln-software-config-305","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-305-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-305-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b382sc_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b382sc_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b382sc_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-305-0-0-0","id":"13392702","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-305-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b382sc%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b382sc:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b382sc:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-305-0-1-0","id":"13392703","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":306,"dataTestId":"vuln-software-config-306","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-306-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-306-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b401_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b401_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b401_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-306-0-0-0","id":"13392704","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-306-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b401%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b401:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b401:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-306-0-1-0","id":"13392705","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":307,"dataTestId":"vuln-software-config-307","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-307-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-307-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b381_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b381_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b381_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-307-0-0-0","id":"13392706","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-307-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b381%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b381:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b381:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-307-0-1-0","id":"13392707","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":308,"dataTestId":"vuln-software-config-308","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-308-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-308-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b400p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b400p_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b400p_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-308-0-0-0","id":"13392708","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-308-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b400p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b400p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b400p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-308-0-1-0","id":"13392709","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":309,"dataTestId":"vuln-software-config-309","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-309-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-309-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-b380p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-b380p_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-b380p_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-309-0-0-0","id":"13392710","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-309-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-b380p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-b380p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-b380p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-309-0-1-0","id":"13392711","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":310,"dataTestId":"vuln-software-config-310","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-310-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-310-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m753n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m753n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m753n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-310-0-0-0","id":"13392712","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-310-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m753n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m753n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m753n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-310-0-1-0","id":"13392713","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":311,"dataTestId":"vuln-software-config-311","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-311-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-311-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m753u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m753u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m753u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-311-0-0-0","id":"13392714","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-311-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m753u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m753u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m753u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-311-0-1-0","id":"13392715","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":312,"dataTestId":"vuln-software-config-312","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-312-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-312-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m623n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m623n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m623n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-312-0-0-0","id":"13393126","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-312-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m623n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m623n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m623n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-312-0-1-0","id":"13393127","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":313,"dataTestId":"vuln-software-config-313","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-313-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-313-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m623u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m623u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m623u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-313-0-0-0","id":"13393128","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-313-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m623u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m623u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m623u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-313-0-1-0","id":"13393129","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":314,"dataTestId":"vuln-software-config-314","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-314-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-314-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m503n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m503n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m503n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-314-0-0-0","id":"13393130","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-314-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m503n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m503n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m503n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-314-0-1-0","id":"13393131","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":315,"dataTestId":"vuln-software-config-315","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-315-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-315-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m453n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m453n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m453n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-315-0-0-0","id":"13392722","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-315-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m453n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m453n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m453n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-315-0-1-0","id":"13392723","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":316,"dataTestId":"vuln-software-config-316","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-316-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-316-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m363n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m363n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m363n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-316-0-0-0","id":"13392724","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-316-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m363n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m363n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m363n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-316-0-1-0","id":"13392725","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":317,"dataTestId":"vuln-software-config-317","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-317-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-317-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m283n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m283n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m283n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-317-0-0-0","id":"13392726","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-317-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m283n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m283n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m283n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-317-0-1-0","id":"13392727","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":318,"dataTestId":"vuln-software-config-318","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-318-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-318-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m503u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m503u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m503u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-318-0-0-0","id":"13392728","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-318-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m503u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m503u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m503u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-318-0-1-0","id":"13392729","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":319,"dataTestId":"vuln-software-config-319","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-319-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-319-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m453u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m453u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m453u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-319-0-0-0","id":"13392730","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-319-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m453u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m453u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m453u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-319-0-1-0","id":"13392731","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":320,"dataTestId":"vuln-software-config-320","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-320-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-320-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asharp%3Amx-m363u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:sharp:mx-m363u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:sharp:mx-m363u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-320-0-0-0","id":"13392732","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-320-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asharp%3Amx-m363u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:sharp:mx-m363u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:sharp:mx-m363u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-320-0-1-0","id":"13392733","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]}]"/>
|
||
|
||
<p id="vulnCpeInfo" >
|
||
<small>
|
||
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
|
||
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
|
||
|
||
</small>
|
||
</p>
|
||
<script src="/site-media/js/vulnerability/cpe-match.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/configurationListing.js"
|
||
type="text/javascript"></script>
|
||
</div>
|
||
</div>
|
||
|
||
<div id="vulnChangeHistoryDiv"
|
||
data-testid="vuln-change-history-container">
|
||
<h3 id="VulnChangeHistorySection">Change History</h3>
|
||
<small> 3 change records found <a href="#VulnChangeHistorySection"
|
||
style="text-decoration: underline" id="changeHistoryToggle">show
|
||
changes</a>
|
||
</small>
|
||
<div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-0">Initial Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-0">11/05/2024 2:34:40 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CWE</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST CWE-79</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-30c25:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-30c25t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-30c25y:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-30c25z:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-30m28:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-30m28t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-30m31:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-30m31t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-30m35:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-30m35t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-50c26:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-50c31:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-50c36:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-50c45:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-50c55:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-50c65:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-50m26:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-50m31:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-50m36:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-50m45:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-50m50:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-50m55:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-55c26:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-60c31:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-60c36:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-60c45:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-70c31:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-70c36:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-70c45:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-70c55:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-70c65:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-70m31:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-70m36:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-70m45:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-70m55:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-70m65:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-70m75:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-70m90:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-90c70_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-90c70:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-90c80_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-90c80:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-b537wr_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-b537wr:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-b540wr_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-b540wr:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-b547wd_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-b547wd:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-b550wd_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-b550wd:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-c533wd_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-c533wd:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-c533wr_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-c533wr:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-c535wd_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-c535wd:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-c535wr_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-c535wr:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-c542wd_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-c542wd:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:bp-c545wd_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:bp-c545wd:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:dx-2000u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:dx-2000u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:dx-2500n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:dx-2500n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:dx-c310_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:dx-c310:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:dx-c311_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:dx-c311:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:dx-c311j_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:dx-c311j:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:dx-c381_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:dx-c381:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:dx-c400_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:dx-c400:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:dx-c401_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:dx-c401:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:dx-c401_j_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:dx-c401_j:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-1810u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-1810u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2010u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2010u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2301n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2301n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2310r_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2310r:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2310u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2310u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2314n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2314n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2314nr_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2314nr:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2600g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2600g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2600n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2600n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2601n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2601n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2610n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2610n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2614n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2614n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2615_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2615_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2615n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2615n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2616n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2616n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2630n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2640n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2640n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2640nr_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2640nr:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-2651:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3050n_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3050n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3050v_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3050v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3051:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3060n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3060v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3061:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3061s:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3070n_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3070n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3070v_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3070v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3071:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3071s:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3100g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3100g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3100n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3100n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3101n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3101n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3110n_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3110n_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3110n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3110n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3111u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3111u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3114n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3114n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3115n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3115n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3116n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3116n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3140n_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3140n_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3140n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3140n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3140nr_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3140nr:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3550n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3550v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3551:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3560n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3560v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3561:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3561s:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3570n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3570v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3571:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3571s:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3610n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3610n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3610nr_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3610nr:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3640n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3640n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-3640nr_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-3640nr:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4050n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4050v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4051:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4060n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4060v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4061:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4061s:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4070n_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4070n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4070v_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4070v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4071:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4071s:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4100n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4100n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4101n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4101n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4110n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4110n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4111n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4111n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4112n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4112n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4140n_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4140n_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4140n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4140n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-4141n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-4141n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-5000n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-5000n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-5001n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-5001n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-5050n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-5050v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-5051:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-5070n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-5070v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-5071:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-5071s:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-5110n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-5110n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-5111n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-5111n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-5112n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-5112n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-5140n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-5140n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-5141n_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-5141n_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-5141n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-5141n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-6050n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-6050v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-6051:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-6070n_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-6070n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-6070v_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-6070v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-6071:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-6071s:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-6240n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-6240n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-6500n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-6500n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-6580n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-7040n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-7040n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-7081:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-7090n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-7500n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-7500n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-7580n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-8081:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-8090n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b355w:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b355wt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b355wz:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b356w:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b356wh:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b376w:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b376wh:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b380p_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b380p:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b381_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b381:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b382_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b382:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b382p_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b382p:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b382sc_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b382sc:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b400p_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b400p:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b401_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b401:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b402_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b402:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b402p_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b402p:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b402sc_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b402sc:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b455w:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b455wt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b455wz:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b456w:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b456wh:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b476w:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-b476wh:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c301_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c301:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c301w_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c301w:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c303:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c303w:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c303wh:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c304:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c304w:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c304wh:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c310_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c310:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c311_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c311:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c312_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c312:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c380_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c380:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c380p_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c380p:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c381_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c381:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c381b_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c381b:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c382sc_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c382sc:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c382scb_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c382scb:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c400_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c400:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c400p_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c400p:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c401_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c401:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-c402sc_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-c402sc:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m1054_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m1054:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m1055_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m1055:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m1056:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m1204_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m1204:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m1205_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m1205:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m1206:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m2630_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m2630:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m264n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m264n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m264nr_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m264nr:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m264nv_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m264nv:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m264u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m264u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m2651:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m265n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m265n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m265ne_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m265ne:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m265nv_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m265nv:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m265u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m265u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m265uv_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m265uv:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m265v_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m265v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m266n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m266n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m266nv_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m266nv:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m283n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m283n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m3050_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m3050:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m3051:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m3070_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m3070:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m3071:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m3071s:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m314n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m314n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m314nr_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m314nr:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m314nv_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m314nv:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m314u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m314u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m315n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m315n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m315ne_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m315ne:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m315nv_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m315nv:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m315u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m315u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m315uv_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m315uv:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m315v_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m315v:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m316n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m316n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m316nv_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m316nv:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m354n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m354n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m354nr_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m354nr:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m354u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m354u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m3550:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m3551:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m356n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m356n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m356nv_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m356nv:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m356u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m356u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m356uv_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m356uv:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m3570:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m3571:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m3571s:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m363n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m363n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m363u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m363u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m364n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m364n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m365n_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m365n_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m365n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m365n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m4050:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m4051:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m4070_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m4070:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m4071:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m4071s:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m453n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m453n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m453u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m453u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m464n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m464n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m465n_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m465n_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m465n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m465n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m503n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m503n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m503u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m503u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m5050:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m5051:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m5070:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m5071:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m5071s:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m564n_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m564n_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m564n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m564n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m565n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m565n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m6050:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m6051:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m6070_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m6070:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m6071:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m6071s:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m623n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m623n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m623u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m623u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m654n_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m654n_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m654n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m654n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m6570:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m753n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m753n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m753u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m753u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m754n_a_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m754n_a:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m754n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m754n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m7570:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m904_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m904:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:sharp:mx-m905:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:toshibatec:e-studio1058_firmware:*:*:*:*:*:*:*:* versions up to (including) t1.01.h4.00
|
||
OR
|
||
cpe:2.3:h:toshibatec:e-studio1058:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:toshibatec:e-studio1208_firmware:*:*:*:*:*:*:*:* versions up to (including) t1.01.h4.00
|
||
OR
|
||
cpe:2.3:h:toshibatec:e-studio1208:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:toshibatec:e-studio908_firmware:*:*:*:*:*:*:*:* versions up to (including) t2.12.h3.00
|
||
OR
|
||
cpe:2.3:h:toshibatec:e-studio908:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://global.sharp/products/copier/info/info_security_2024-10.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://global.sharp/products/copier/info/info_security_2024-10.html Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://jvn.jp/en/vu/JVNVU95063136/ No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://jvn.jp/en/vu/JVNVU95063136/ Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.toshibatec.com/information/20241025_01.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.toshibatec.com/information/20241025_01.html Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-1">CVE Modified by JPCERT/CC</span> <span
|
||
data-testid="vuln-change-history-date-1">10/25/2024 5:15:06 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">JPCERT/CC https://global.sharp/products/copier/info/info_security_2024-10.html [No types assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">JPCERT/CC https://global.sharp/products/copier/info/info_security_2024-10-25.html</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-2">New CVE Received from JPCERT/CC</span> <span
|
||
data-testid="vuln-change-history-date-2">10/25/2024 3:15:04 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Description</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">Sharp and Toshiba Tec MFPs improperly validate input data in URI data registration, resulting in a stored cross-site scripting vulnerability.
|
||
If crafted input is stored by an administrative user, malicious script may be executed on the web browsers of other victim users.</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">JPCERT/CC AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CWE</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">JPCERT/CC CWE-79</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">JPCERT/CC https://global.sharp/products/copier/info/info_security_2024-10-25.html [No types assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">JPCERT/CC https://jvn.jp/en/vu/JVNVU95063136/ [No types assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">JPCERT/CC https://www.toshibatec.com/information/20241025_01.html [No types assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="col-lg-3 col-md-5 col-sm-12">
|
||
|
||
<div class="bs-callout bs-callout-info">
|
||
<h4>Quick Info</h4>
|
||
<strong>CVE Dictionary Entry:</strong><br/> <a
|
||
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
|
||
href="https://cve.org/CVERecord?id=CVE-2024-48870">CVE-2024-48870</a><br/> <strong>NVD
|
||
Published Date:</strong><br/> <span
|
||
data-testid="vuln-published-on">10/25/2024</span><br/> <strong>NVD
|
||
Last Modified:</strong><br/> <span
|
||
data-testid="vuln-last-modified-on">11/05/2024</span><br/> <strong>
|
||
Source:</strong><br/> <span
|
||
data-testid="vuln-current-description-source">JPCERT/CC</span><br/>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</td>
|
||
</tr>
|
||
</table>
|
||
|
||
</div>
|
||
<!-- Hidden input for padding -->
|
||
<input type="hidden" value="FvtYhPFC1hcInYtjJ7Ot5XtJSOT1zrVGJufaxzs6653aoUegAEhoKk1Epqu2SdBt7MVbPuufcUpj61zliovynDawZSfJ21m5pWXY5LtpnUEu5ZLwE9Z4mIP5MzjFDl6Txdkh6uyhmuew1I91QmZHhfXZL0IzoURIdXcyH8QbHKwtWOOeMjT9hSDph3iKmKHMbLuh633x6iwcmQXWvzwC9P3FbJbAJ8pQw2jlrLWPenraXuWGbw1FWvTNvBNCTTUXPE33NJCFmiRtWltE9sAvXlvSrMpX3ixXFFxZmy32Bjo7ioSd0VM9QZZSyF9lvyeUHWfm3UT1eL4TRrk9v7CJd0PJ003Nqxh0JTjIWlrL4uMHCN63GZtX4M51QPML4tkJV1z7ca8TRSNZHyoFB0iIY93FNZ8xcgl3cG0VHrcnnzkKq0CEjXmipHMVxhCz3MDFEmbyc8ViLRvMrZZQCrzDzb1SaKYWZSrqQGW6aBXswijGzkvK9ZHKsd4UpQK1WtFD3BCPPmRSEp0JSHKBwTGAUX3bYUHLYvDCetK2LVhwRvrYGIIMMGFZOytpscwiSFtllueKpHEn2Fds2KTKCE95AGtHBYs75pZfE32XNvouU4HIZbCVjmg7GKkDXAOKotoCFk2xiMW4z5pyTZoU5fyx8SSvXY8iTix5UDmvFEv6n350Wmmy4UgbfIPCdnobee8mJWyUXXIxoxacydfETOrzJAuQzWdUHU0rIpWHAaZGl8wMTZ866LPgm5dhmxyQCFnyo4D03AQ5eYW38meaaQEEKadQGTUYGgCkw70CoyeeqQZmckWv87PEsRR2Q2sAasYcJXKhdCBbXQp0QfI4AFkHZCB1oTyUlcX2xHwFEVBOjgU9EoTOT1DiiGd0QeFiFNnCH0cmGp3soCTvJRFfw7nm6EVVjVXu3Iwp5eaQEKsozSWjlJxN2MXRzJ2gLIYYFBb9EoGmyqLFHKC2ydtSPkp1" id="padding" name="padding"/>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</main>
|
||
<footer id="footer" role="contentinfo">
|
||
<div class="container">
|
||
|
||
<div class="row">
|
||
<div class="col-sm-12">
|
||
<ul class="social-list pull-right">
|
||
<li class="field-item service-twitter list-horiz"><a
|
||
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span>
|
||
</a></li>
|
||
<li class="field-item service-facebook list-horiz"><a
|
||
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-linkedin list-horiz"><a
|
||
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-youtube list-horiz"><a
|
||
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-rss list-horiz"><a
|
||
href="https://www.nist.gov/news-events/nist-rss-feeds"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
|
||
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
|
||
</a></li>
|
||
<li class="field-item service-govdelivery list-horiz last"><a
|
||
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
|
||
<i class="fa fa-envelope fa-fw"><span
|
||
class="element-invisible">govdelivery</span></i><span class="ext"><span
|
||
class="element-invisible"> (link is external)</span></span>
|
||
</a></li>
|
||
</ul>
|
||
<span class="hidden-xs"> <a
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
<div class="row hidden-sm hidden-md hidden-lg">
|
||
<div class="col-sm-12">
|
||
<a href="https://www.nist.gov"
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row footer-contact-container">
|
||
<div class="col-sm-6">
|
||
<strong>HEADQUARTERS</strong>
|
||
<br>
|
||
100 Bureau Drive
|
||
<br>
|
||
Gaithersburg, MD 20899
|
||
<br>
|
||
<a href="tel:301-975-2000">(301) 975-2000</a>
|
||
<br>
|
||
<br>
|
||
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
|
||
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
|
||
| <a href="https://www.nist.gov/about-nist/visit"
|
||
style="display: inline-block;">Our Other Offices</a>
|
||
</div>
|
||
<div class="col-sm-6">
|
||
<div class="pull-right"
|
||
style="text-align:right">
|
||
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
|
||
<br>
|
||
US-CERT Security Operations Center
|
||
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
|
||
<br> Phone: 1-888-282-0870
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row">
|
||
<nav title="Footer Navigation" role="navigation"
|
||
class="row footer-bottom-links-container">
|
||
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
|
||
<p>
|
||
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
||
|
|
||
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
||
|
|
||
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
||
|
|
||
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/foia">FOIA</a>
|
||
|
|
||
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
||
|
|
||
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
||
|
|
||
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
||
|
|
||
<a href="https://www.science.gov/">Science.gov</a>
|
||
|
|
||
<a href="https://www.usa.gov/">USA.gov</a>
|
||
</p>
|
||
</nav>
|
||
</div>
|
||
</div>
|
||
</footer>
|
||
</body>
|
||
</html>
|
||
|
||
|