Search criteria

9 vulnerabilities found for b1_firmware by seil

FKIE_CVE-2017-10856

Vulnerability from fkie_nvd - Published: 2017-09-15 17:29 - Updated: 2025-04-20 01:37
Summary
SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device's encrypted communications via a specially crafted packet.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:4.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCD5B0AE-9433-4923-82F0-3DA10526641E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:5.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "9648927F-D1A7-4287-AA69-2C09F9CCE10D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:seil:b1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E9D891-10A8-4A16-9CB6-BE031C713EE4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:seil:bpv_4_firmware:5.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7071D3E5-1468-4AC0-8C60-E7D74E0A0B61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:bpv_4_firmware:5.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3CEDDA-50F6-4F67-84A9-3F3ADE40A999",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:seil:bpv_4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB68F73D-A80D-4B4A-A865-F20C23B419B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:seil:x1_firmware:4.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "85854003-80DC-41C4-A944-5D14CE27B534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:x1_firmware:5.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7E8F25A-BF5A-423F-85A9-BCA591B346A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:seil:x1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA40A80E-6BB7-401B-874B-FFF01B4114AF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:seil:x2_firmware:4.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "389544EF-2F71-482D-BA9B-8D183DCD54A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:x2_firmware:5.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F89D635-1A79-4401-A51D-49DCBEB9B67A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:seil:x2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6AE9731-348F-41B3-A347-F6C4B63300CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:seil:x86_fuji_firmware:3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A5AFC54-DAEA-48C7-AFCD-0226262963EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:x86_fuji_firmware:5.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "96090329-E826-4307-BC79-B4E811012AD0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:seil:x86_fuji:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0B7F96-4A3D-4240-96B0-62CC4148CFCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device\u0027s encrypted communications via a specially crafted packet."
    },
    {
      "lang": "es",
      "value": "SEIL/X 4.60 a 5.72, SEIL/B1 4.60 a 5.72, SEIL/x86 3.20 a 5.72 y SEIL/BPV4 5.00 a 5.72 permite que atacantes remotos provoquen un fallo temporal de las comunicaciones cifradas del dispositivo mediante un paquete especialmente manipulado."
    }
  ],
  "id": "CVE-2017-10856",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 3.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-09-15T17:29:00.383",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/support/security/a01811.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/support/security/a01811.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2017-2153

Vulnerability from fkie_nvd - Published: 2017-04-28 16:59 - Updated: 2025-04-20 01:37
Summary
SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:seil:x86_fuji_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E503A14-51A8-47E9-B721-D50B738E228C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:seil:x86_fuji:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0B7F96-4A3D-4240-96B0-62CC4148CFCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:seil:bpv_4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31BD6EF0-AF25-4D81-BAEA-6F587CCCD6CB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:seil:bpv_4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB68F73D-A80D-4B4A-A865-F20C23B419B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:seil:x1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "712036F3-5CDA-452B-A38A-253C69CF3E3F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:seil:x1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA40A80E-6BB7-401B-874B-FFF01B4114AF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:seil:x2_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47A51475-9031-4010-AB40-F187FE23B295",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:seil:x2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6AE9731-348F-41B3-A347-F6C4B63300CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "744B18F3-5534-423D-A4A6-D8CFF4339BF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:seil:b1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E9D891-10A8-4A16-9CB6-BE031C713EE4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets."
    },
    {
      "lang": "es",
      "value": "SEIL/x86 Fuji 1.70 a 5.62, SEIL/BPV4 5.00 a 5.62, SEIL/X1 1.30 a 5.62, SEIL/X2 1.30 a 5.62 y SEIL/B1 1.00 a 5.62 permiten a los atacantes remotos causar una denegaci\u00f3n de servicio a trav\u00e9s de paquetes UDP IPv4 especialmente dise\u00f1ados."
    }
  ],
  "id": "CVE-2017-2153",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-04-28T16:59:02.060",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN86171513/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/support/security/a01783.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN86171513/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/support/security/a01783.html"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-2632

Vulnerability from fkie_nvd - Published: 2012-06-15 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session.
Impacted products
Vendor Product Version
seil b1 2.30
seil b1 2.40
seil b1 2.41
seil b1 2.42
seil b1 2.50
seil b1 2.51
seil b1 2.52
seil b1 2.60
seil b1 2.61
seil b1 2.62
seil b1 2.63
seil b1 2.70
seil b1 2.72
seil b1 2.73
seil b1 2.74
seil b1 2.75
seil b1 3.01
seil b1 3.02
seil b1 3.10
seil b1 3.11
seil b1 3.12
seil b1 3.13
seil b1 3.20
seil b1 3.21
seil b1 3.30
seil b1 3.31
seil b1 3.40
seil b1 3.41
seil b1 3.50
seil b1 3.51
seil b1 3.60
seil b1 3.70
seil b1 3.71
seil b1 3.75
seil x1 2.30
seil x1 2.40
seil x1 2.41
seil x1 2.42
seil x1 2.50
seil x1 2.51
seil x1 2.52
seil x1 2.60
seil x1 2.61
seil x1 2.62
seil x1 2.63
seil x1 2.70
seil x1 2.72
seil x1 2.73
seil x1 2.74
seil x1 2.75
seil x1 3.01
seil x1 3.02
seil x1 3.10
seil x1 3.11
seil x1 3.12
seil x1 3.13
seil x1 3.20
seil x1 3.21
seil x1 3.30
seil x1 3.31
seil x1 3.40
seil x1 3.41
seil x1 3.50
seil x1 3.51
seil x1 3.60
seil x1 3.70
seil x1 3.71
seil x1 3.75
seil x2 2.30
seil x2 2.40
seil x2 2.41
seil x2 2.42
seil x2 2.50
seil x2 2.51
seil x2 2.52
seil x2 2.60
seil x2 2.61
seil x2 2.62
seil x2 2.63
seil x2 2.70
seil x2 2.72
seil x2 2.73
seil x2 2.74
seil x2 2.75
seil x2 3.01
seil x2 3.02
seil x2 3.10
seil x2 3.11
seil x2 3.12
seil x2 3.13
seil x2 3.20
seil x2 3.21
seil x2 3.30
seil x2 3.31
seil x2 3.40
seil x2 3.41
seil x2 3.50
seil x2 3.51
seil x2 3.60
seil x2 3.70
seil x2 3.71
seil x2 3.75
seil b1_firmware 2.30
seil b1_firmware 2.40
seil b1_firmware 2.41
seil b1_firmware 2.42
seil b1_firmware 2.50
seil b1_firmware 2.51
seil b1_firmware 2.52
seil b1_firmware 2.60
seil b1_firmware 2.61
seil b1_firmware 2.62
seil b1_firmware 2.63
seil b1_firmware 2.70
seil b1_firmware 2.72
seil b1_firmware 2.73
seil b1_firmware 2.74
seil b1_firmware 2.75
seil b1_firmware 3.01
seil b1_firmware 3.02
seil b1_firmware 3.10
seil b1_firmware 3.11
seil b1_firmware 3.12
seil b1_firmware 3.13
seil b1_firmware 3.20
seil b1_firmware 3.21
seil b1_firmware 3.30
seil b1_firmware 3.31
seil b1_firmware 3.40
seil b1_firmware 3.41
seil b1_firmware 3.50
seil b1_firmware 3.51
seil b1_firmware 3.60
seil b1_firmware 3.70
seil b1_firmware 3.71
seil b1_firmware 3.75
seil x86_firmware 1.00
seil x86_firmware 1.61

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:seil:b1:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "363148D7-E3C5-476F-888C-31692F73FC1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "18A4E9AC-64A9-4585-8889-75B885FA8359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF7C5C45-6A98-4DB4-9EC7-6426254CF3AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CF3E2DD-A82F-4D27-80AA-57DE4C835E3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "6322C3D4-0B01-474E-9265-35AF4DD516EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "982534C1-C167-4CBB-A56E-513F356CC994",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "41399354-E237-4A2A-9B6B-E63B2662E3DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C7E15A3-19B8-45E2-B856-8F28CC8C280C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "676E5932-66E5-4FAB-855F-98C5F94A19EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9BBC9C8-9C8B-41BD-8BD5-785AC85E1FC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "E07EF718-826D-4AC4-8C86-D44A29AA78AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "0922B5D6-8B08-42AB-BD3E-DE5F38EFF6EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CC6A6EB-9D10-4DB4-B9ED-9D00DEF96EBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "374821DE-C0BE-4C68-8B6C-B4B07EF1C46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "05324D90-B60E-40A2-89C4-B5142C066021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "16444EF8-690E-4255-A60E-51D741A8F54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "81EBF6C1-A32B-46DC-9612-C2FE1ABF2627",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1289B41-28A4-41D3-A092-9F76B1AF6834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA846901-03C5-48C6-8B03-BD8A4E92E251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2180323C-228A-4C29-927E-C19CEE807F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "712DD1DC-4191-4B68-9B9B-E9BDE5B114CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7224DC-86EB-4876-8D8D-B907165D5EF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D2D9907-DEA8-445F-9842-538E31DAE63C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "51531ED0-3C36-46D1-9F94-66CA9A98964F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB02717B-B93F-4FA6-91ED-18A15ED39529",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9492E49-4914-4165-8406-CD409B9533A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AE3B68F-B637-4FE4-9942-7D6A0EAE3C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "14BED143-E85C-4B8F-8630-35080A911E0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "15179500-7194-4663-B601-A99468F8E1F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "D41BECF5-8E3C-464E-B64D-13B61623F83E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "054CDEC9-4F71-415A-98C8-5D36893A4CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "512BE46D-0D0F-432C-B3D3-F8C43A40945A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "37BEE6BB-FB53-44C2-B8F6-26028D90ADF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "E635DC32-BCA3-40D8-9D53-A216E1A008C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0353B874-9EFA-41E1-9E53-040A4B778D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E20904-51CE-48E1-A61D-17E13B85D57D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3929172-60B4-4AE0-B80A-290F1F653A9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "89392531-4DBE-437E-AF7D-3044CA638E86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "67A26C6C-FF23-41E0-92F0-60BF9E603162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D46283-9927-4116-8B1A-964D90927872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "80694620-F1A1-4EAB-8BEF-89FC2D8AA871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "B32A7AF0-89D1-4636-9DF4-030607B3E6CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBB00AD-5B6A-4C6A-A55D-741509B8F5D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E4BED3-867C-4500-978C-6A1950583C42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5FCC542-1794-4923-9C0B-448578E40BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E011DE1-BC94-4D2A-99FF-097857A28198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "23537089-9AEE-43A6-868C-6A14A6E1A1A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAAE376E-9AAB-4FC4-8330-4BE2656EB38F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "22DABCCB-7DD9-48FF-9949-219DB1C86AFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "9699AE15-D7A1-4293-87CD-03382DA26B48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD32FB4-D5CA-4B8E-9530-582774920E7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCD232C0-E29A-4E4A-A705-3DDCAE34649D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8908E10F-DDF6-44E4-A93E-9C2DEA9078DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BCED1B7-5B94-42B6-B831-0A4D0E7C9796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "107327B7-5C33-4195-959C-CDA39633C4E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C65BE6D4-403C-47B6-8CD3-A88CE8794A55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA81178C-ECF1-47F1-977A-8DBAD5AD2528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C507FAEB-9EDD-449A-A22A-754F582023B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDF2F222-3FEA-4D66-953D-2FC297C5F6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C8340D-C338-400B-B934-42BAECC9C20E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB311CAE-FE73-4FC5-B949-3CAA9D59AFFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "290C1676-56DA-472D-9CAD-5B87760974B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1860271-BCDB-448D-8D79-D602FEEC634A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "F956482A-BFEC-4285-B85F-11CA56D97AAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BD2FCCD-AFED-4C14-9C59-13B123385363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6CF63B4-8D0C-40A5-8734-B4988AF8EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF1EB48B-CEB3-42CA-B3C0-6F0B06789C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD398D0C-E533-4EE0-A55E-39A868699867",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "10FF138F-0A19-4D2F-9C7C-12303A533875",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "7860C101-A585-4D26-8D65-0B04154245C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB8560EC-4A12-4792-BDCB-FA3B8972ED69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0B3278B-CA7E-4043-B39B-B6B04605634B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "82D58786-6929-4BAB-91B2-67AECCEC65EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4E5D48B-E84A-4759-9F87-0EF60352DE14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6C96023-017B-4880-93CD-75CA522A6107",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4267653-44FD-48F2-A838-322295CD2A34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "A09D1A20-52F5-4D80-B00A-C1DF369D72B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "05E1455D-22CC-41F4-A5BD-63D91EE5C748",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "1925D84D-569A-4BFB-AE03-18FEA3DDD271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D358F4-8B0B-4812-8CDA-74F3731EA501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83BE04D-69BC-4F62-A4C1-A65B762476E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD22078-BA28-43A8-8169-F167AD13D905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "13D20BF2-99E7-4C91-9B51-4E5A5637BED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C889686-9E23-44ED-B376-3932803A4057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30E7E09-A8BB-442F-8CEA-7BCFBE53D48F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFF9EAFE-8906-404C-BBED-0852FCA82B16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "429F239F-B545-4FDF-A332-136693E85996",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D9D5B9-7048-4933-9657-310FBD1017EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F59D213-0FC6-4C78-8D72-3030738423A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3CC3640-4849-4E4E-A377-93DD27F22184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "623908C5-F1DA-45FB-A3C6-6541E40D13A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B400B72-9F2D-43BF-A5BD-63E2B07A4E0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "893FEBFD-CF10-4F27-81C1-8B61462534B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "8850E165-5E32-4F86-B77D-158C8529F252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C91A039-AC46-40B8-8106-02ADC3ED44AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C392849-4425-42B9-A384-19F0F9EDD958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A66AF10E-4CC5-4BF1-BA9E-EA89B988C7C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E6BAF2-0C3F-4996-8932-673E21C73CF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A67D5EA-AEA6-4E29-9B82-499BA54F1319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "55AFD5DD-5EAF-4347-B58C-AC7F376DE90F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FE96121-D65D-4AD4-B779-EBF243507710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2334DAE0-E647-4395-9CB6-5A42A753C9B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "78551AE9-F930-4643-8C63-9A4E6F6AC37A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D5515A0-59A3-48D3-886B-1A521C87945D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "298A5A1E-0053-4F79-8EC6-CA039172CB9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CDDF455-121C-45ED-8E94-D88271513938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E0C5E1-DD68-4428-BFAC-AC4713CE1D9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDB2021-AC8E-473C-9DEE-08DDC07B3E4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C930C4-B8B4-40A6-BC75-16B1C426EA9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "6692E733-DFF0-48FE-95AE-6401F582384C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A3BE6F6-F586-49A1-83BD-D45AB1DAE556",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "EADA6D53-F16E-4BC5-90DA-0CEED1F14B7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AD875EC-54CE-43D2-9642-B8F6AD94FE82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF099B1-85D3-44A6-9CE0-8436B0D80CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "B379EFA5-926B-4E5F-B350-FEB23694244D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DCC773D-352E-4B2B-8D0B-9767CA38AD7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "87ABDD31-2BCE-44EF-81C6-0155B73EC4F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "46139215-3BFF-4869-88AA-BAA3BBDE2F99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C2B7C7-501A-42FD-BB10-AB5118B10B74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C381A9EF-B6BC-42BB-A5A4-C199670126F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "197B7157-4122-486B-A306-CA60D3F546FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A707B39-F82A-47EF-A35A-CC87C63A948B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "97D870A8-EA7E-44C7-9277-37413BFA3FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E7133D-17A5-43B3-8E56-9E6082C1CAB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A75EB6A-FE34-4A15-86F6-7AC14BAC956C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DBE0714-B263-4642-8A65-C96FCCDBA3F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5985C29-C438-45C8-B824-8EFD67FC6B03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "720C7F1E-C3B8-4D73-8470-197074C3D344",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "27FFE1C2-EB16-494C-BB15-7CC2799AABF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "84DECA7D-1D49-4FB5-91C9-2345948544D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA94CE8-D10E-4740-959F-91A0D26BB613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "B97F9240-6168-492B-9357-C750281FC6F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A521DC6-D80C-46B3-8C60-364FD411B792",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "040FF640-1303-4EDB-A356-9C1C8B23DE64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4537E1A-EC42-47BB-987E-8DA9F57F1FC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FF343DB-D6D0-48A9-9225-56AFA6C632D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:x86_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAEE5507-E177-41CC-B95F-1003CF795DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:x86_firmware:1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDFF5DBD-22A3-4111-A7C8-98AE409B839C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
    },
    {
      "lang": "es",
      "value": "Los routers SEIL con firmware SEIL/x86 1.00 hasta la 2.35, SEIL/X1 2.30 hasta la 3.75, SEIL/X2 2.30 hasta la 3.75, y SEIL/B1 2.30 hasta la 3.75, si las funcionalidades http-proxy y application-gateway est\u00e1n activas, no manejan apropiadamente el comando CONNECT, lo que permite a atacantes remotos evitar las restricciones previstas de URL a trav\u00e9s de una sesi\u00f3n TCP."
    }
  ],
  "id": "CVE-2012-2632",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-06-15T19:55:01.530",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/support/security/a01232.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/support/security/a01232.html"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2017-10856 (GCVE-0-2017-10856)

Vulnerability from cvelistv5 – Published: 2017-09-15 17:00 – Updated: 2024-08-05 17:50
VLAI?
Summary
SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device's encrypted communications via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
  • Denial-of-service (DoS)
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:50:12.562Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#76692689",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01811.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SEIL/X",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "4.60 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/B1",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "4.60 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/x86",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "3.20 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/BPV4",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.00 to 5.72"
            }
          ]
        }
      ],
      "datePublic": "2017-09-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device\u0027s encrypted communications via a specially crafted packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial-of-service (DoS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-15T16:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#76692689",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.seil.jp/support/security/a01811.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2017-10856",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SEIL/X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "4.60 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/B1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "4.60 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/x86",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "3.20 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/BPV4",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.00 to 5.72"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Internet Initiative Japan Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device\u0027s encrypted communications via a specially crafted packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial-of-service (DoS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#76692689",
              "refsource": "JVN",
              "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01811.html",
              "refsource": "MISC",
              "url": "http://www.seil.jp/support/security/a01811.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2017-10856",
    "datePublished": "2017-09-15T17:00:00",
    "dateReserved": "2017-07-04T00:00:00",
    "dateUpdated": "2024-08-05T17:50:12.562Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-2153 (GCVE-0-2017-2153)

Vulnerability from cvelistv5 – Published: 2017-04-28 16:00 – Updated: 2024-08-05 13:48
VLAI?
Summary
SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets.
Severity ?
No CVSS data available.
CWE
  • Denial-of-service (DoS)
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T13:48:04.413Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01783.html"
          },
          {
            "name": "JVN#86171513",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN86171513/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SEIL/x86 Fuji",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "1.70 to 5.62"
            }
          ]
        },
        {
          "product": "SEIL/BPV4",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.00 to 5.62"
            }
          ]
        },
        {
          "product": "SEIL/X1",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "1.30 to 5.62"
            }
          ]
        },
        {
          "product": "SEIL/X2",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "1.30 to 5.62"
            }
          ]
        },
        {
          "product": "SEIL/B1",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "1.00 to 5.62"
            }
          ]
        }
      ],
      "datePublic": "2017-04-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial-of-service (DoS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-04-28T15:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.seil.jp/support/security/a01783.html"
        },
        {
          "name": "JVN#86171513",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN86171513/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2017-2153",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SEIL/x86 Fuji",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.70 to 5.62"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/BPV4",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.00 to 5.62"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/X1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.30 to 5.62"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/X2",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.30 to 5.62"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/B1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.00 to 5.62"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Internet Initiative Japan Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial-of-service (DoS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01783.html",
              "refsource": "MISC",
              "url": "http://www.seil.jp/support/security/a01783.html"
            },
            {
              "name": "JVN#86171513",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN86171513/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2017-2153",
    "datePublished": "2017-04-28T16:00:00",
    "dateReserved": "2016-12-01T00:00:00",
    "dateUpdated": "2024-08-05T13:48:04.413Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-2632 (GCVE-0-2012-2632)

Vulnerability from cvelistv5 – Published: 2012-06-15 19:00 – Updated: 2024-09-16 17:34
VLAI?
Summary
SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN24646833/index.html third-party-advisoryx_refsource_JVN
http://www.seil.jp/support/security/a01232.html x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:31.953Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2012-000059",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
          },
          {
            "name": "JVN#24646833",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01232.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-06-15T19:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVNDB-2012-000059",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
        },
        {
          "name": "JVN#24646833",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01232.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2012-2632",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2012-000059",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
            },
            {
              "name": "JVN#24646833",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01232.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01232.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2012-2632",
    "datePublished": "2012-06-15T19:00:00Z",
    "dateReserved": "2012-05-14T00:00:00Z",
    "dateUpdated": "2024-09-16T17:34:25.260Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-10856 (GCVE-0-2017-10856)

Vulnerability from nvd – Published: 2017-09-15 17:00 – Updated: 2024-08-05 17:50
VLAI?
Summary
SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device's encrypted communications via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
  • Denial-of-service (DoS)
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:50:12.562Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#76692689",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01811.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SEIL/X",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "4.60 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/B1",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "4.60 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/x86",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "3.20 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/BPV4",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.00 to 5.72"
            }
          ]
        }
      ],
      "datePublic": "2017-09-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device\u0027s encrypted communications via a specially crafted packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial-of-service (DoS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-15T16:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#76692689",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.seil.jp/support/security/a01811.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2017-10856",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SEIL/X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "4.60 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/B1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "4.60 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/x86",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "3.20 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/BPV4",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.00 to 5.72"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Internet Initiative Japan Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device\u0027s encrypted communications via a specially crafted packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial-of-service (DoS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#76692689",
              "refsource": "JVN",
              "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01811.html",
              "refsource": "MISC",
              "url": "http://www.seil.jp/support/security/a01811.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2017-10856",
    "datePublished": "2017-09-15T17:00:00",
    "dateReserved": "2017-07-04T00:00:00",
    "dateUpdated": "2024-08-05T17:50:12.562Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-2153 (GCVE-0-2017-2153)

Vulnerability from nvd – Published: 2017-04-28 16:00 – Updated: 2024-08-05 13:48
VLAI?
Summary
SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets.
Severity ?
No CVSS data available.
CWE
  • Denial-of-service (DoS)
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T13:48:04.413Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01783.html"
          },
          {
            "name": "JVN#86171513",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN86171513/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SEIL/x86 Fuji",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "1.70 to 5.62"
            }
          ]
        },
        {
          "product": "SEIL/BPV4",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.00 to 5.62"
            }
          ]
        },
        {
          "product": "SEIL/X1",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "1.30 to 5.62"
            }
          ]
        },
        {
          "product": "SEIL/X2",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "1.30 to 5.62"
            }
          ]
        },
        {
          "product": "SEIL/B1",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "1.00 to 5.62"
            }
          ]
        }
      ],
      "datePublic": "2017-04-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial-of-service (DoS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-04-28T15:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.seil.jp/support/security/a01783.html"
        },
        {
          "name": "JVN#86171513",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN86171513/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2017-2153",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SEIL/x86 Fuji",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.70 to 5.62"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/BPV4",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.00 to 5.62"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/X1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.30 to 5.62"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/X2",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.30 to 5.62"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/B1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.00 to 5.62"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Internet Initiative Japan Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial-of-service (DoS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01783.html",
              "refsource": "MISC",
              "url": "http://www.seil.jp/support/security/a01783.html"
            },
            {
              "name": "JVN#86171513",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN86171513/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2017-2153",
    "datePublished": "2017-04-28T16:00:00",
    "dateReserved": "2016-12-01T00:00:00",
    "dateUpdated": "2024-08-05T13:48:04.413Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-2632 (GCVE-0-2012-2632)

Vulnerability from nvd – Published: 2012-06-15 19:00 – Updated: 2024-09-16 17:34
VLAI?
Summary
SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN24646833/index.html third-party-advisoryx_refsource_JVN
http://www.seil.jp/support/security/a01232.html x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:31.953Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2012-000059",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
          },
          {
            "name": "JVN#24646833",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01232.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-06-15T19:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVNDB-2012-000059",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
        },
        {
          "name": "JVN#24646833",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01232.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2012-2632",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2012-000059",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
            },
            {
              "name": "JVN#24646833",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01232.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01232.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2012-2632",
    "datePublished": "2012-06-15T19:00:00Z",
    "dateReserved": "2012-05-14T00:00:00Z",
    "dateUpdated": "2024-09-16T17:34:25.260Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}